WorldWideScience

Sample records for preserving itemset mining

  1. Personalized privacy-preserving frequent itemset mining using randomized response.

    Science.gov (United States)

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  2. High utility-itemset mining and privacy-preserving utility mining

    Directory of Open Access Journals (Sweden)

    Jerry Chun-Wei Lin

    2016-03-01

    Full Text Available In recent decades, high-utility itemset mining (HUIM has emerging a critical research topic since the quantity and profit factors are both concerned to mine the high-utility itemsets (HUIs. Generally, data mining is commonly used to discover interesting and useful knowledge from massive data. It may, however, lead to privacy threats if private or secure information (e.g., HUIs are published in the public place or misused. In this paper, we focus on the issues of HUIM and privacy-preserving utility mining (PPUM, and present two evolutionary algorithms to respectively mine HUIs and hide the sensitive high-utility itemsets in PPUM. Extensive experiments showed that the two proposed models for the applications of HUIM and PPUM can not only generate the high quality profitable itemsets according to the user-specified minimum utility threshold, but also enable the capability of privacy preserving for private or secure information (e.g., HUIs in real-word applications.

  3. Towards Rare Itemset Mining

    OpenAIRE

    Szathmary , Laszlo; Napoli , Amedeo; Valtchev , Petko

    2007-01-01

    site de la conférence : http://ictai07.ceid.upatras.gr/; International audience; We describe here a general approach for rare itemset mining. While mining literature has been almost exclusively focused on frequent itemsets, in many practical situations rare ones are of higher interest (e.g., in medical databases, rare combinations of symptoms might provide useful insights for the physicians). Based on an examination of the relevant substructures of the mining space, our approach splits the ra...

  4. An Evolutionary Algorithm to Mine High-Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Jerry Chun-Wei Lin

    2015-01-01

    Full Text Available High-utility itemset mining (HUIM is a critical issue in recent years since it can be used to reveal the profitable products by considering both the quantity and profit factors instead of frequent itemset mining (FIM of association rules (ARs. In this paper, an evolutionary algorithm is presented to efficiently mine high-utility itemsets (HUIs based on the binary particle swarm optimization. A maximal pattern (MP-tree strcutrue is further designed to solve the combinational problem in the evolution process. Substantial experiments on real-life datasets show that the proposed binary PSO-based algorithm has better results compared to the state-of-the-art GA-based algorithm.

  5. Rare itemsets mining algorithm based on RP-Tree and spark framework

    Science.gov (United States)

    Liu, Sainan; Pan, Haoan

    2018-05-01

    For the issues of the rare itemsets mining in big data, this paper proposed a rare itemsets mining algorithm based on RP-Tree and Spark framework. Firstly, it arranged the data vertically according to the transaction identifier, in order to solve the defects of scan the entire data set, the vertical datasets are divided into frequent vertical datasets and rare vertical datasets. Then, it adopted the RP-Tree algorithm to construct the frequent pattern tree that contains rare items and generate rare 1-itemsets. After that, it calculated the support of the itemsets by scanning the two vertical data sets, finally, it used the iterative process to generate rare itemsets. The experimental show that the algorithm can effectively excavate rare itemsets and have great superiority in execution time.

  6. Mining top-k frequent closed itemsets in data streams using sliding window

    International Nuclear Information System (INIS)

    Rehman, Z.; Shahbaz, M.

    2013-01-01

    Frequent itemset mining has become a popular research area in data mining community since the last few years. T here are two main technical hitches while finding frequent itemsets. First, to provide an appropriate minimum support value to start and user need to tune this minimum support value by running the algorithm again and again. Secondly, generated frequent itemsets are mostly numerous and as a result a number of association rules generated are also very large in numbers. Applications dealing with streaming environment need to process the data received at high rate, therefore, finding frequent itemsets in data streams becomes complex. In this paper, we present an algorithm to mine top-k frequent closed itemsets using sliding window approach from streaming data. We developed a single-pass algorithm to find frequent closed itemsets of length between user's defined minimum and maximum- length. To improve the performance of algorithm and to avoid rescanning of data, we have transformed data into bitmap based tree data structure. (author)

  7. Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data

    Directory of Open Access Journals (Sweden)

    András Király

    2014-01-01

    Full Text Available During the last decade various algorithms have been developed and proposed for discovering overlapping clusters in high-dimensional data. The two most prominent application fields in this research, proposed independently, are frequent itemset mining (developed for market basket data and biclustering (applied to gene expression data analysis. The common limitation of both methodologies is the limited applicability for very large binary data sets. In this paper we propose a novel and efficient method to find both frequent closed itemsets and biclusters in high-dimensional binary data. The method is based on simple but very powerful matrix and vector multiplication approaches that ensure that all patterns can be discovered in a fast manner. The proposed algorithm has been implemented in the commonly used MATLAB environment and freely available for researchers.

  8. FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining

    Directory of Open Access Journals (Sweden)

    K. R. Seeja

    2014-01-01

    Full Text Available This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.

  9. FraudMiner: a novel credit card fraud detection model based on frequent itemset mining.

    Science.gov (United States)

    Seeja, K R; Zareapoor, Masoumeh

    2014-01-01

    This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.

  10. Application of frequent itemsets mining to analyze patterns of one-stop visits in Taiwan.

    Directory of Open Access Journals (Sweden)

    Chun-Yi Tu

    Full Text Available BACKGROUND: The free choice of health care facilities without limitations on frequency of visits within the National Health Insurance in Taiwan gives rise to not only a high number of annual ambulatory visits per capita but also a unique "one-stop shopping"phenomenon, which refers to a patient' visits to several specialties of the same healthcare facility in one day. The visits to multiple physicians would increase the potential risk of polypharmacy. The aim of this study was to analyze the frequency and patterns of one-stop visits in Taiwan. METHODOLOGY/PRINCIPAL FINDINGS: The claims datasets of 1 million nationally representative people within Taiwan's National Health Insurance in 2005 were used to calculate the number of patients with one-stop visits. The frequent itemsets mining was applied to compute the combination patterns of specialties in the one-stop visits. Among the total 13,682,469 ambulatory care visits in 2005, one-stop visits occurred 144,132 times and involved 296,822 visits (2.2% of all visits by 66,294 (6.6% persons. People tended to have this behavior with age and the percentage reached 27.5% (5,662 in 20,579 in the age group ≥80 years. In general, women were more likely to have one-stop visits than men (7.2% vs. 6.0%. Internal medicine plus ophthalmology was the most frequent combination with a visited frequency of 3,552 times (2.5%, followed by cardiology plus neurology with 3,183 times (2.2%. The most frequent three-specialty combination, cardiology plus neurology and gastroenterology, occurred only 111 times. CONCLUSIONS/SIGNIFICANCE: Without the novel computational technique, it would be hardly possible to analyze the extremely diverse combination patterns of specialties in one-stop visits. The results of the study could provide useful information either for the hospital manager to set up integrated services or for the policymaker to rebuild the health care system.

  11. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  12. Energy Efficient in-Sensor Data Cleaning for Mining Frequent Itemsets

    Directory of Open Access Journals (Sweden)

    Jacques M. BAHI

    2012-03-01

    Full Text Available Limited energy, storage, computational power represent the main constraint of sensor networks. Development of algorithms that take into consideration this extremely demanding and constrained environment of sensor networks became a major challenge. Communicating messages over a sensor network consume far more energy than processing it and mining sensors data should respect the characteristics of sensor networks in terms of energy and computation constraints, network dynamics, and faults. This lead us to think of a data cleaning pre processing phase to reduce the packet size transmitted and prepare the data for an efficient and scalable data mining. This paper introduces a tree-based bi-level periodic data cleaning approach implemented on both the source node and the aggregator levels. Our contribution in this paper is two folds. First we look on a periodic basis at each data measured and periodically clean it while taking into consideration the number of occurrences of the measures captured which we shall call weight. Then, a data cleaning is performed between groups of nodes on the level of the aggregator, which contains lists of measures along with their weights. The quality of the information should be preserved during the in-network transmission through the weight of each measure captured by the sensors. This weight will constitute the key optimization of the frequent pattern tree. The result set will constitute a perfect training set to mine without higher CPU consumption allowing us to send only the useful information to the sink. The experimental results show the effectiveness of this technique in terms of energy efficiency and quality of the information by focusing on a periodical data cleaning while taking into consideration the weight of the data captured.

  13. BAMBOO: Accelerating Closed Itemset Mining by Deeply Pushing the Length-Decreasing Support Constraint

    National Research Council Canada - National Science Library

    Wang, Jianyong; Karypis, George

    2003-01-01

    Previous study has shown that mining frequent patterns with length-decreasing support constraint is very helpful in removing some uninteresting patterns based on the observation that short patterns...

  14. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  15. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  16. Finding Frequent Closed Itemsets in Sliding Window in Linear Time

    Science.gov (United States)

    Chen, Junbo; Zhou, Bo; Chen, Lu; Wang, Xinyu; Ding, Yiqun

    One of the most well-studied problems in data mining is computing the collection of frequent itemsets in large transactional databases. Since the introduction of the famous Apriori algorithm [14], many others have been proposed to find the frequent itemsets. Among such algorithms, the approach of mining closed itemsets has raised much interest in data mining community. The algorithms taking this approach include TITANIC [8], CLOSET+[6], DCI-Closed [4], FCI-Stream [3], GC-Tree [15], TGC-Tree [16] etc. Among these algorithms, FCI-Stream, GC-Tree and TGC-Tree are online algorithms work under sliding window environments. By the performance evaluation in [16], GC-Tree [15] is the fastest one. In this paper, an improved algorithm based on GC-Tree is proposed, the computational complexity of which is proved to be a linear combination of the average transaction size and the average closed itemset size. The algorithm is based on the essential theorem presented in Sect. 4.2. Empirically, the new algorithm is several orders of magnitude faster than the state of art algorithm, GC-Tree.

  17. Mining of high utility itemsets of size-2 with pruning strategies and negative item values for B2C companies based on experiential marketing approach

    Directory of Open Access Journals (Sweden)

    Gaurav Gahlot

    2016-09-01

    Full Text Available Business to customer (B2C marketing for the retail organisations is the most rapid adoption made by the developed countries, while it has the pitfalls in the developing nations. B2C companies have been continually putting some or the other lucrative offers and schemes on their manufactured products. There happens to be no logical demand of clubbing the sale of two products. The only need of such clubbing is the financial crisis which the company wants to overcome. Information technology can renew and make the competitive advantage for B2C companies. In this paper, a novel way for finding the itemset clubs is proposed, hence extending Apriori algorithm. The proposed methodology aims at finding the combinations of the products which can be sold together with the high levels of utility. This allows for making good profits for the company. Unlike contemporary way of items bearing positive values, negative item values have been looked into. The MHUIS-2wPS algorithm utilises the transactional experiences of the retail stores and outputs the size-2 clubs. The MHUI-NIV algorithm caters for the items with negative item values. The dissertation applies various pruning strategies for the discovery of high utility itemsets. These prunings will help remove the unnecessary formation of the low utility extensions. Later, various datasets have been used to show the essence of the algorithms.

  18. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  19. The study on privacy preserving data mining for information security

    Science.gov (United States)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  20. Large-Scale Constraint-Based Pattern Mining

    Science.gov (United States)

    Zhu, Feida

    2009-01-01

    We studied the problem of constraint-based pattern mining for three different data formats, item-set, sequence and graph, and focused on mining patterns of large sizes. Colossal patterns in each data formats are studied to discover pruning properties that are useful for direct mining of these patterns. For item-set data, we observed robustness of…

  1. Utility Independent Privacy Preserving Data Mining - Horizontally Partitioned Data

    Directory of Open Access Journals (Sweden)

    E Poovammal

    2010-06-01

    Full Text Available Micro data is a valuable source of information for research. However, publishing data about individuals for research purposes, without revealing sensitive information, is an important problem. The main objective of privacy preserving data mining algorithms is to obtain accurate results/rules by analyzing the maximum possible amount of data without unintended information disclosure. Data sets for analysis may be in a centralized server or in a distributed environment. In a distributed environment, the data may be horizontally or vertically partitioned. We have developed a simple technique by which horizontally partitioned data can be used for any type of mining task without information loss. The partitioned sensitive data at 'm' different sites are transformed using a mapping table or graded grouping technique, depending on the data type. This transformed data set is given to a third party for analysis. This may not be a trusted party, but it is still allowed to perform mining operations on the data set and to release the results to all the 'm' parties. The results are interpreted among the 'm' parties involved in the data sharing. The experiments conducted on real data sets prove that our proposed simple transformation procedure preserves one hundred percent of the performance of any data mining algorithm as compared to the original data set while preserving privacy.

  2. PRIVACY PRESERVING DATA MINING USING MULTIPLE OBJECTIVE OPTIMIZATION

    Directory of Open Access Journals (Sweden)

    V. Shyamala Susan

    2016-10-01

    Full Text Available Privacy preservation is that the most targeted issue in information publication, because the sensitive data shouldn't be leaked. For this sake, several privacy preservation data mining algorithms are proposed. In this work, feature selection using evolutionary algorithm and data masking coupled with slicing is treated as a multiple objective optimisation to preserve privacy. To start with, Genetic Algorithm (GA is carried out over the datasets to perceive the sensitive attributes and prioritise the attributes for treatment as per their determined sensitive level. In the next phase, to distort the data, noise is added to the higher level sensitive value using Hybrid Data Transformation (HDT method. In the following phase slicing algorithm groups the correlated attributes organized and by this means reduces the dimensionality by retaining the Advanced Clustering Algorithm (ACA. With the aim of getting the optimal dimensions of buckets, tuple segregating is accomplished by Metaheuristic Firefly Algorithm (MFA. The investigational consequences imply that the anticipated technique can reserve confidentiality and therefore the information utility is additionally high. Slicing algorithm allows the protection of association and usefulness in which effects in decreasing the information dimensionality and information loss. Performance analysis is created over OCC 7 and OCC 15 and our optimization method proves its effectiveness over two totally different datasets by showing 92.98% and 96.92% respectively.

  3. Efficient Algorithms for Segmentation of Item-Set Time Series

    Science.gov (United States)

    Chundi, Parvathi; Rosenkrantz, Daniel J.

    We propose a special type of time series, which we call an item-set time series, to facilitate the temporal analysis of software version histories, email logs, stock market data, etc. In an item-set time series, each observed data value is a set of discrete items. We formalize the concept of an item-set time series and present efficient algorithms for segmenting a given item-set time series. Segmentation of a time series partitions the time series into a sequence of segments where each segment is constructed by combining consecutive time points of the time series. Each segment is associated with an item set that is computed from the item sets of the time points in that segment, using a function which we call a measure function. We then define a concept called the segment difference, which measures the difference between the item set of a segment and the item sets of the time points in that segment. The segment difference values are required to construct an optimal segmentation of the time series. We describe novel and efficient algorithms to compute segment difference values for each of the measure functions described in the paper. We outline a dynamic programming based scheme to construct an optimal segmentation of the given item-set time series. We use the item-set time series segmentation techniques to analyze the temporal content of three different data sets—Enron email, stock market data, and a synthetic data set. The experimental results show that an optimal segmentation of item-set time series data captures much more temporal content than a segmentation constructed based on the number of time points in each segment, without examining the item set data at the time points, and can be used to analyze different types of temporal data.

  4. Mining Views : database views for data mining

    NARCIS (Netherlands)

    Blockeel, H.; Calders, T.; Fromont, É.; Goethals, B.; Prado, A.

    2008-01-01

    We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining views. We show that several types of patterns and models over the data, such as itemsets, association rules and decision

  5. Mining Views : database views for data mining

    NARCIS (Netherlands)

    Blockeel, H.; Calders, T.; Fromont, É.; Goethals, B.; Prado, A.; Nijssen, S.; De Raedt, L.

    2007-01-01

    We propose a relational database model towards the integration of data mining into relational database systems, based on the so called virtual mining views. We show that several types of patterns and models over the data, such as itemsets, association rules, decision trees and clusterings, can be

  6. Hybrid Recommendation System Memanfaatkan Penggalian Frequent Itemset dan Perbandingan Keyword

    OpenAIRE

    Suka Parwita, Wayan Gede; Winarko, Edi

    2015-01-01

    Abstrak Recommendation system sering dibangun dengan memanfaatkan data peringkat item dan data identitas pengguna. Data peringkat item merupakan data yang langka pada sistem yang baru dibangun. Sedangkan, pemberian data identitas pada recommendation system dapat menimbulkan kekhawatiran penyalahgunaan data identitas. Hybrid recommendation system memanfaatkan algoritma penggalian frequent itemset dan perbandingan keyword dapat memberikan daftar rekomendasi tanpa menggunakan data identi...

  7. A Frame Work for Ontological Privacy Preserved Mining

    OpenAIRE

    Sriman Narayana Iyengar. N.Ch.; Geetha Mary. A

    2010-01-01

    Data Mining analyses the stocked data and helps in foretelling the future trends. There are different techniques by which data can be mined. These different techniques reveal different types of hiddenknowledge. Using the right procedure of technique result specific patterns emerge.Ontology is a specification of conceptualization. It is a description of concepts and relationships that can exist for an agent or a community of agents. To make software more user-friendly, ontology could be used t...

  8. Quantum algorithm for association rules mining

    Science.gov (United States)

    Yu, Chao-Hua; Gao, Fei; Wang, Qing-Le; Wen, Qiao-Yan

    2016-10-01

    Association rules mining (ARM) is one of the most important problems in knowledge discovery and data mining. Given a transaction database that has a large number of transactions and items, the task of ARM is to acquire consumption habits of customers by discovering the relationships between itemsets (sets of items). In this paper, we address ARM in the quantum settings and propose a quantum algorithm for the key part of ARM, finding frequent itemsets from the candidate itemsets and acquiring their supports. Specifically, for the case in which there are Mf(k ) frequent k -itemsets in the Mc(k ) candidate k -itemsets (Mf(k )≤Mc(k ) ), our algorithm can efficiently mine these frequent k -itemsets and estimate their supports by using parallel amplitude estimation and amplitude amplification with complexity O (k/√{Mc(k )Mf(k ) } ɛ ) , where ɛ is the error for estimating the supports. Compared with the classical counterpart, i.e., the classical sampling-based algorithm, whose complexity is O (k/Mc(k ) ɛ2) , our quantum algorithm quadratically improves the dependence on both ɛ and Mc(k ) in the best case when Mf(k )≪Mc(k ) and on ɛ alone in the worst case when Mf(k )≈Mc(k ) .

  9. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  10. A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining

    OpenAIRE

    Hongwei Tian; Weining Zhang; Shouhuai Xu; Patrick Sharkey

    2012-01-01

    Privacy-preserving data mining (PPDM) is an important problem and is currently studied in three approaches: the cryptographic approach, the data publishing, and the model publishing. However, each of these approaches has some problems. The cryptographic approach does not protect privacy of learned knowledge models and may have performance and scalability issues. The data publishing, although is popular, may suffer from too much utility loss for certain types of data mining applications. The m...

  11. Mining Contextual Information for Ephemeral Digital Video Preservation

    OpenAIRE

    Shah, Chirag

    2009-01-01

    For centuries the archival community has understood and practiced the art of adding contextual information while preserving an artifact. The question now is how these practices can be transferred to the digital domain. With the growing expansion of production and consumption of digital objects (documents, audio, video, etc.) it has become essential to identify and study issues related to their representation. A cura­tor in the digital realm may be said to have the same responsibilities as on...

  12. Mining Contextual Information for Ephemeral Digital Video Preservation

    Directory of Open Access Journals (Sweden)

    Chirag Shah

    2009-06-01

    Full Text Available Normal 0 For centuries the archival community has understood and practiced the art of adding contextual information while preserving an artifact. The question now is how these practices can be transferred to the digital domain. With the growing expansion of production and consumption of digital objects (documents, audio, video, etc. it has become essential to identify and study issues related to their representation. A cura­tor in the digital realm may be said to have the same responsibilities as one in a traditional archival domain. However, with the mass production and spread of digital objects, it may be difficult to do all the work manually. In the present article this problem is considered in the area of digital video preservation. We show how this problem can be formulated and propose a framework for capturing contextual infor­mation for ephemeral digital video preservation. This proposal is realized in a system called ContextMiner, which allows us to cater to a digital curator's needs with its four components: digital video curation, collection visualization, browsing interfaces, and video harvesting and monitoring. While the issues and systems described here are geared toward digital videos, they can easily be applied to other kinds of digital objects.

  13. 36 CFR 251.10 - Prohibition of location of mining claims within certain areas in the Norbeck Wildlife Preserve...

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 2 2010-07-01 2010-07-01 false Prohibition of location of mining claims within certain areas in the Norbeck Wildlife Preserve, South Dakota. 251.10 Section 251.10... areas in the Norbeck Wildlife Preserve, South Dakota. The location of mining claims in such areas within...

  14. Privacy-Preserving Data Mining of Medical Data Using Data Separation-Based Techniques

    Directory of Open Access Journals (Sweden)

    Gang Kou

    2007-08-01

    Full Text Available Data mining is concerned with the extraction of useful knowledge from various types of data. Medical data mining has been a popular data mining topic of late. Compared with other data mining areas, medical data mining has some unique characteristics. Because medical files are related to human subjects, privacy concerns are taken more seriously than other data mining tasks. This paper applied data separation-based techniques to preserve privacy in classification of medical data. We take two approaches to protect privacy: one approach is to vertically partition the medical data and mine these partitioned data at multiple sites; the other approach is to horizontally split data across multiple sites. In the vertical partition approach, each site uses a portion of the attributes to compute its results, and the distributed results are assembled at a central trusted party using a majority-vote ensemble method. In the horizontal partition approach, data are distributed among several sites. Each site computes its own data, and a central trusted party is responsible to integrate these results. We implement these two approaches using medical datasets from UCI KDD archive and report the experimental results.

  15. 78 FR 13379 - Wrangell-St. Elias National Park and Preserve, Alaska; Proposed Mining Plan of Operations

    Science.gov (United States)

    2013-02-27

    ...] Wrangell-St. Elias National Park and Preserve, Alaska; Proposed Mining Plan of Operations AGENCY: National...) unpatented placer claims within Wrangell-St. Elias National Park and Preserve. Public Availability: This plan...: Wrangell-St. Elias National Park and Preserve Headquarters, Mile 106.8 Richardson Highway, Post Office Box...

  16. DeBi: Discovering Differentially Expressed Biclusters using a Frequent Itemset Approach

    Directory of Open Access Journals (Sweden)

    Vingron Martin

    2011-06-01

    Full Text Available Abstract Background The analysis of massive high throughput data via clustering algorithms is very important for elucidating gene functions in biological systems. However, traditional clustering methods have several drawbacks. Biclustering overcomes these limitations by grouping genes and samples simultaneously. It discovers subsets of genes that are co-expressed in certain samples. Recent studies showed that biclustering has a great potential in detecting marker genes that are associated with certain tissues or diseases. Several biclustering algorithms have been proposed. However, it is still a challenge to find biclusters that are significant based on biological validation measures. Besides that, there is a need for a biclustering algorithm that is capable of analyzing very large datasets in reasonable time. Results Here we present a fast biclustering algorithm called DeBi (Differentially Expressed BIclusters. The algorithm is based on a well known data mining approach called frequent itemset. It discovers maximum size homogeneous biclusters in which each gene is strongly associated with a subset of samples. We evaluate the performance of DeBi on a yeast dataset, on synthetic datasets and on human datasets. Conclusions We demonstrate that the DeBi algorithm provides functionally more coherent gene sets compared to standard clustering or biclustering algorithms using biological validation measures such as Gene Ontology term and Transcription Factor Binding Site enrichment. We show that DeBi is a computationally efficient and powerful tool in analyzing large datasets. The method is also applicable on multiple gene expression datasets coming from different labs or platforms.

  17. A New Approach for Mining Order-Preserving Submatrices Based on All Common Subsequences.

    Science.gov (United States)

    Xue, Yun; Liao, Zhengling; Li, Meihang; Luo, Jie; Kuang, Qiuhua; Hu, Xiaohui; Li, Tiechen

    2015-01-01

    Order-preserving submatrices (OPSMs) have been applied in many fields, such as DNA microarray data analysis, automatic recommendation systems, and target marketing systems, as an important unsupervised learning model. Unfortunately, most existing methods are heuristic algorithms which are unable to reveal OPSMs entirely in NP-complete problem. In particular, deep OPSMs, corresponding to long patterns with few supporting sequences, incur explosive computational costs and are completely pruned by most popular methods. In this paper, we propose an exact method to discover all OPSMs based on frequent sequential pattern mining. First, an existing algorithm was adjusted to disclose all common subsequence (ACS) between every two row sequences, and therefore all deep OPSMs will not be missed. Then, an improved data structure for prefix tree was used to store and traverse ACS, and Apriori principle was employed to efficiently mine the frequent sequential pattern. Finally, experiments were implemented on gene and synthetic datasets. Results demonstrated the effectiveness and efficiency of this method.

  18. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    Science.gov (United States)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  19. A knowledge discovery approach to urban analysis: Beyoglu Preservation Area as a data mine

    Directory of Open Access Journals (Sweden)

    Ahu Sokmenoglu Sohtorik

    2017-11-01

    to the potentially ‘useful’ and/or ‘valuable’ information patterns and relationships that can be discovered in urban databases by applying data mining algorithms. A knowledge discovery approach to urban analysis through data mining can help us to understand site-specific characteristics of urban environments in a more profound and useful way. On a more specific level, the thesis aims towards ‘knowledge discovery’ in traditional thematic maps published in 2008 by the Istanbul Metropolitan Municipality as a basis of the Master Plan for the Beyoğlu Preservation Area. These thematic maps, which represent urban components, namely buildings, streets, neighbourhoods and their various attributes such as floor space use of the buildings, land price, population density or historical importance, do not really extend our knowledge of Beyoğlu Preservation Area beyond documenting its current state and do not contribute to the interventions presented in the master plan. However it is likely that ‘useful’ and ‘valuable’ information patterns discoverable using data mining algorithms are hidden in them. In accordance with the stated aims, three research questions of the thesis concerns (1 the development of a general process model to adapt the generic process of knowledge discovery using data mining for urban data analysis, (2 the investigation of information patterns and relationships that can be extracted from the traditional thematic maps of the Beyoğlu Preservation Area by further developing and implementing this model and (3 the investigation of how could this ‘relational urban knowledge’ support architects, urban designers or urban planners whilst developing intervention proposals for urban regeneration. A Knowledge Discovery Process Model (KDPM for urban analysis was developed, as an answer to the the first research question. The KDPM for urban analysis is a domain-specific adaptation of the widely accepted process of knowledge discovery in databases

  20. Preservation procedures for arsenic speciation in a stream affected by acid mine drainage in southwestern Spain

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez-Rodas, Daniel; Oliveira, Vanesa; Gomez-Ariza, Jose Luis [University of Huelva, Department of Chemistry and Materials Science, Faculty of Experimental Sciences, Huelva (Spain); Sarmiento, Aguasanta M.; Nieto, Jose Miguel [University of Huelva, Department of Geology, Faculty of Experimental Sciences, Huelva (Spain)

    2006-04-15

    A preservation study has been performed for arsenic speciation in surface freshwaters affected by acid mine drainage (AMD), a pollution source characterized by low pH and high metallic content. Two sample preservation procedures described in the literature were attempted using opaque glass containers and refrigeration: i) addition of 0.25 mol L{sup -1} EDTA to the samples, which maintained the stability of the arsenic species for 3 h; and ii) in situ sample clean-up with a cationic exchange resin, in order to reduce the metallic load, which resulted in a partial co-adsorption of arsenic onto Fe precipitates. A new proposed method was also tried: sample acidification with 6 mol L{sup -1} HCl followed by in situ clean-up with a cationic exchange resin, which allowed a longer preservation time of at least 48 h. The proposed method was successfully applied to water samples with high arsenic content, taken from the Aguas Agrias Stream (Odiel River Basin, SW Spain), which is severely affected by AMD that originates at the nearby polymetallic sulfide mine of Tharsis. The speciation results obtained by liquid chromatography-hydride generation-atomic fluorescence spectrometry (HPLC-HG-AFS) indicated that during the summer the main arsenic species was As(V) at the hundred {mu}g L{sup -1} level, followed by DMA (dimethyl arsenic) and As(III) below the ten {mu}g L{sup -1} level. In winter, As(V) and As(III) increased at least fivefold, whereas the DMA was not detected. (orig.)

  1. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    Science.gov (United States)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  2. A New Approach for Mining Order-Preserving Submatrices Based on All Common Subsequences

    Directory of Open Access Journals (Sweden)

    Yun Xue

    2015-01-01

    Full Text Available Order-preserving submatrices (OPSMs have been applied in many fields, such as DNA microarray data analysis, automatic recommendation systems, and target marketing systems, as an important unsupervised learning model. Unfortunately, most existing methods are heuristic algorithms which are unable to reveal OPSMs entirely in NP-complete problem. In particular, deep OPSMs, corresponding to long patterns with few supporting sequences, incur explosive computational costs and are completely pruned by most popular methods. In this paper, we propose an exact method to discover all OPSMs based on frequent sequential pattern mining. First, an existing algorithm was adjusted to disclose all common subsequence (ACS between every two row sequences, and therefore all deep OPSMs will not be missed. Then, an improved data structure for prefix tree was used to store and traverse ACS, and Apriori principle was employed to efficiently mine the frequent sequential pattern. Finally, experiments were implemented on gene and synthetic datasets. Results demonstrated the effectiveness and efficiency of this method.

  3. A partition enhanced mining algorithm for distributed association rule mining systems

    Directory of Open Access Journals (Sweden)

    A.O. Ogunde

    2015-11-01

    Full Text Available The extraction of patterns and rules from large distributed databases through existing Distributed Association Rule Mining (DARM systems is still faced with enormous challenges such as high response times, high communication costs and inability to adapt to the constantly changing databases. In this work, a Partition Enhanced Mining Algorithm (PEMA is presented to address these problems. In PEMA, the Association Rule Mining Coordinating Agent receives a request and decides the appropriate data sites, partitioning strategy and mining agents to use. The mining process is divided into two stages. In the first stage, the data agents horizontally segment the databases with small average transaction length into relatively smaller partitions based on the number of available sites and the available memory. On the other hand, databases with relatively large average transaction length were vertically partitioned. After this, Mobile Agent-Based Association Rule Mining-Agents, which are the mining agents, carry out the discovery of the local frequent itemsets. At the second stage, the local frequent itemsets were incrementally integrated by the from one data site to another to get the global frequent itemsets. This reduced the response time and communication cost in the system. Results from experiments conducted on real datasets showed that the average response time of PEMA showed an improvement over existing algorithms. Similarly, PEMA incurred lower communication costs with average size of messages exchanged lower when compared with benchmark DARM systems. This result showed that PEMA could be efficiently deployed for efficient discovery of valuable knowledge in distributed databases.

  4. Information system for preserving culture heritage in areas affected by heavy industry and mining

    Science.gov (United States)

    Pacina, Jan; Kopecký, Jiří; Bedrníková, Lenka; Handrychová, Barbora; Švarcová, Martina; Holá, Markéta; Pončíková, Edita

    2014-05-01

    The natural development of the Ústí region (North-West Bohemia, the Czech Republic) has been affected by the human activity during the past hundred years. The heavy industrialization and the brown coal mining have completely changed the land-use in the region. The open-pit coal mines are completely destroying the surrounding landscape, including settlement, communications, hydrological network and the over-all natural development of the region. The other factor affecting the natural development of the landscape, land-use and settlement was the political situation in 1945 (end of the 2nd World War) when the borderland was depopulated. All these factors caused vanishing of more than two hundreds of colonies, villages and towns during this period of time. The task of this project is to prepare and offer for public use a comprehensive information system preserving the cultural heritage in the form of processed old maps, aerial imagery, land-use and georelief reconstructions, local studies, text and photo documents covering the extinct landscape and settlement. Wide range of various maps was used for this area - Müller's map of Bohemia (ca. 1720) followed by the 1st, 2nd and 3rd Military survey of Habsburg empire (1792, 1894, 1938), maps of Stabile cadaster (ca. 1840) and State map derived in the scale 1:5000 (1953, 1972, 1981). All the maps were processed, georeferenced, hand digitized and are further used as base layers for visualization and analysis. The historical aerial imagery was processed in standard ways of photogrammetry and is covering the year 1938, 1953 and the current state. The other important task covered by this project is the georelief reconstruction. We use the old maps and aerial imagery to reconstruct the complete time-line of the georelief development. This time-line is covering the period since 1938 until now. The derived digital terrain models and further on analyzed and printed on a 3D printer. Other reconstruction task are performed using

  5. Research of Improved Apriori Algorithm Based on Itemset Array

    Directory of Open Access Journals (Sweden)

    Naili Liu

    2013-06-01

    Full Text Available Mining frequent item sets is a major key process in data mining research. Apriori and many improved algorithms are lowly efficient because they need scan database many times and storage transaction ID in memory, so time and space overhead is very high. Especially, they are lower efficient when they process large scale database. The main task of the improved algorithm is to reduce time and space overhead for mining frequent item sets. Because, it scans database only once to generate binary item set array, it adopts binary instead of transaction ID when it storages transaction flag, it adopts logic AND operation to judge whether an item set is frequent item set. Moreover, the improved algorithm is more suitable for large scale database. Experimental results show that the improved algorithm has better efficiency than classic Apriori algorithm.

  6. An efficient reversible privacy-preserving data mining technology over data streams.

    Science.gov (United States)

    Lin, Chen-Yi; Kao, Yuan-Hung; Lee, Wei-Bin; Chen, Rong-Chang

    2016-01-01

    With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices.

  7. Efficient frequent pattern mining algorithm based on node sets in cloud computing environment

    Science.gov (United States)

    Billa, V. N. Vinay Kumar; Lakshmanna, K.; Rajesh, K.; Reddy, M. Praveen Kumar; Nagaraja, G.; Sudheer, K.

    2017-11-01

    The ultimate goal of Data Mining is to determine the hidden information which is useful in making decisions using the large databases collected by an organization. This Data Mining involves many tasks that are to be performed during the process. Mining frequent itemsets is the one of the most important tasks in case of transactional databases. These transactional databases contain the data in very large scale where the mining of these databases involves the consumption of physical memory and time in proportion to the size of the database. A frequent pattern mining algorithm is said to be efficient only if it consumes less memory and time to mine the frequent itemsets from the given large database. Having these points in mind in this thesis we proposed a system which mines frequent itemsets in an optimized way in terms of memory and time by using cloud computing as an important factor to make the process parallel and the application is provided as a service. A complete framework which uses a proven efficient algorithm called FIN algorithm. FIN algorithm works on Nodesets and POC (pre-order coding) tree. In order to evaluate the performance of the system we conduct the experiments to compare the efficiency of the same algorithm applied in a standalone manner and in cloud computing environment on a real time data set which is traffic accidents data set. The results show that the memory consumption and execution time taken for the process in the proposed system is much lesser than those of standalone system.

  8. Mining

    Directory of Open Access Journals (Sweden)

    Khairullah Khan

    2014-09-01

    Full Text Available Opinion mining is an interesting area of research because of its applications in various fields. Collecting opinions of people about products and about social and political events and problems through the Web is becoming increasingly popular every day. The opinions of users are helpful for the public and for stakeholders when making certain decisions. Opinion mining is a way to retrieve information through search engines, Web blogs and social networks. Because of the huge number of reviews in the form of unstructured text, it is impossible to summarize the information manually. Accordingly, efficient computational methods are needed for mining and summarizing the reviews from corpuses and Web documents. This study presents a systematic literature survey regarding the computational techniques, models and algorithms for mining opinion components from unstructured reviews.

  9. Using Machine Learning Methods Jointly to Find Better Set of Rules in Data Mining

    Directory of Open Access Journals (Sweden)

    SUG Hyontai

    2017-01-01

    Full Text Available Rough set-based data mining algorithms are one of widely accepted machine learning technologies because of their strong mathematical background and capability of finding optimal rules based on given data sets only without room for prejudiced views to be inserted on the data. But, because the algorithms find rules very precisely, we may confront with the overfitting problem. On the other hand, association rule algorithms find rules of association, where the association resides between sets of items in database. The algorithms find itemsets that occur more than given minimum support, so that they can find the itemsets practically in reasonable time even for very large databases by supplying the minimum support appropriately. In order to overcome the problem of the overfitting problem in rough set-based algorithms, first we find large itemsets, after that we select attributes that cover the large itemsets. By using the selected attributes only, we may find better set of rules based on rough set theory. Results from experiments support our suggested method.

  10. Data mining approach to bipolar cognitive map development and decision analysis

    Science.gov (United States)

    Zhang, Wen-Ran

    2002-03-01

    A data mining approach to cognitive mapping is presented based on bipolar logic, bipolar relations, and bipolar clustering. It is shown that a correlation network derived from a database can be converted to a bipolar cognitive map (or bipolar relation). A transitive, symmetric, and reflexive bipolar relation (equilibrium relation) can be used to identify focal links in decision analysis. It can also be used to cluster a set of events or itemsets into three different clusters: coalition sets, conflict sets, and harmony sets. The coalition sets are positively correlated events or itemsets; each conflict set is a negatively correlated set of two coalition subsets; and a harmony set consists of events that are both negatively and positively correlated. A cognitive map and the clusters can then be used for online decision analysis. This approach combines knowledge discovery with the views of decision makers and provides an effective means for online analytical processing (OLAP) and online analytical mining (OLAM).

  11. An Incremental High-Utility Mining Algorithm with Transaction Insertion

    Science.gov (United States)

    Gan, Wensheng; Zhang, Binbin

    2015-01-01

    Association-rule mining is commonly used to discover useful and meaningful patterns from a very large database. It only considers the occurrence frequencies of items to reveal the relationships among itemsets. Traditional association-rule mining is, however, not suitable in real-world applications since the purchased items from a customer may have various factors, such as profit or quantity. High-utility mining was designed to solve the limitations of association-rule mining by considering both the quantity and profit measures. Most algorithms of high-utility mining are designed to handle the static database. Fewer researches handle the dynamic high-utility mining with transaction insertion, thus requiring the computations of database rescan and combination explosion of pattern-growth mechanism. In this paper, an efficient incremental algorithm with transaction insertion is designed to reduce computations without candidate generation based on the utility-list structures. The enumeration tree and the relationships between 2-itemsets are also adopted in the proposed algorithm to speed up the computations. Several experiments are conducted to show the performance of the proposed algorithm in terms of runtime, memory consumption, and number of generated patterns. PMID:25811038

  12. An Incremental High-Utility Mining Algorithm with Transaction Insertion

    Directory of Open Access Journals (Sweden)

    Jerry Chun-Wei Lin

    2015-01-01

    Full Text Available Association-rule mining is commonly used to discover useful and meaningful patterns from a very large database. It only considers the occurrence frequencies of items to reveal the relationships among itemsets. Traditional association-rule mining is, however, not suitable in real-world applications since the purchased items from a customer may have various factors, such as profit or quantity. High-utility mining was designed to solve the limitations of association-rule mining by considering both the quantity and profit measures. Most algorithms of high-utility mining are designed to handle the static database. Fewer researches handle the dynamic high-utility mining with transaction insertion, thus requiring the computations of database rescan and combination explosion of pattern-growth mechanism. In this paper, an efficient incremental algorithm with transaction insertion is designed to reduce computations without candidate generation based on the utility-list structures. The enumeration tree and the relationships between 2-itemsets are also adopted in the proposed algorithm to speed up the computations. Several experiments are conducted to show the performance of the proposed algorithm in terms of runtime, memory consumption, and number of generated patterns.

  13. Analyzing large gene expression and methylation data profiles using StatBicRM: statistical biclustering-based rule mining.

    Directory of Open Access Journals (Sweden)

    Ujjwal Maulik

    Full Text Available Microarray and beadchip are two most efficient techniques for measuring gene expression and methylation data in bioinformatics. Biclustering deals with the simultaneous clustering of genes and samples. In this article, we propose a computational rule mining framework, StatBicRM (i.e., statistical biclustering-based rule mining to identify special type of rules and potential biomarkers using integrated approaches of statistical and binary inclusion-maximal biclustering techniques from the biological datasets. At first, a novel statistical strategy has been utilized to eliminate the insignificant/low-significant/redundant genes in such way that significance level must satisfy the data distribution property (viz., either normal distribution or non-normal distribution. The data is then discretized and post-discretized, consecutively. Thereafter, the biclustering technique is applied to identify maximal frequent closed homogeneous itemsets. Corresponding special type of rules are then extracted from the selected itemsets. Our proposed rule mining method performs better than the other rule mining algorithms as it generates maximal frequent closed homogeneous itemsets instead of frequent itemsets. Thus, it saves elapsed time, and can work on big dataset. Pathway and Gene Ontology analyses are conducted on the genes of the evolved rules using David database. Frequency analysis of the genes appearing in the evolved rules is performed to determine potential biomarkers. Furthermore, we also classify the data to know how much the evolved rules are able to describe accurately the remaining test (unknown data. Subsequently, we also compare the average classification accuracy, and other related factors with other rule-based classifiers. Statistical significance tests are also performed for verifying the statistical relevance of the comparative results. Here, each of the other rule mining methods or rule-based classifiers is also starting with the same post

  14. Analyzing large gene expression and methylation data profiles using StatBicRM: statistical biclustering-based rule mining.

    Science.gov (United States)

    Maulik, Ujjwal; Mallik, Saurav; Mukhopadhyay, Anirban; Bandyopadhyay, Sanghamitra

    2015-01-01

    Microarray and beadchip are two most efficient techniques for measuring gene expression and methylation data in bioinformatics. Biclustering deals with the simultaneous clustering of genes and samples. In this article, we propose a computational rule mining framework, StatBicRM (i.e., statistical biclustering-based rule mining) to identify special type of rules and potential biomarkers using integrated approaches of statistical and binary inclusion-maximal biclustering techniques from the biological datasets. At first, a novel statistical strategy has been utilized to eliminate the insignificant/low-significant/redundant genes in such way that significance level must satisfy the data distribution property (viz., either normal distribution or non-normal distribution). The data is then discretized and post-discretized, consecutively. Thereafter, the biclustering technique is applied to identify maximal frequent closed homogeneous itemsets. Corresponding special type of rules are then extracted from the selected itemsets. Our proposed rule mining method performs better than the other rule mining algorithms as it generates maximal frequent closed homogeneous itemsets instead of frequent itemsets. Thus, it saves elapsed time, and can work on big dataset. Pathway and Gene Ontology analyses are conducted on the genes of the evolved rules using David database. Frequency analysis of the genes appearing in the evolved rules is performed to determine potential biomarkers. Furthermore, we also classify the data to know how much the evolved rules are able to describe accurately the remaining test (unknown) data. Subsequently, we also compare the average classification accuracy, and other related factors with other rule-based classifiers. Statistical significance tests are also performed for verifying the statistical relevance of the comparative results. Here, each of the other rule mining methods or rule-based classifiers is also starting with the same post-discretized data

  15. A Data mining and Meta-Analysis of Geodiversity and Geological Preservation Studies: Pedodiversity, the Other Side of the Coin

    Science.gov (United States)

    Ibáñez, Juanjo; Brevik, Eric C.; Cerdà, Artemi

    2017-04-01

    Land degradation processes are complex and diverse (Yan and Cai, 2015; Álvarez-Martínez et al., 2016; Zhang et al., 2016). To understand the processes of degradation there is the need to understand a wide range of factors, including the sociological, biological, hydrological and geological components of the ecosystems (de Araujo et al., 2015; Li et al., 2016; Muñoz Rojas et al., 2016; Rodrigo Comino et al., 2016). Although the most widely accepted definitions of geodiversity include geology, landforms and soils, in practice published studies on the preservation of geodiversity typically ignore the soil resource and pay more attention to other items, while many others do not include soils in such definitions. Soils are a key component of the Earth system as they regulate the hydrological, erosional, biological and geochemical Earth cycles (Keesstra et al., 2012; Brevik et al., 2015), offer resources, goods and services to human societies (Mol and Keesstra, 2012), and are a key issue in the United Nations goals to achieve sustainability (Keesstra et al., 2016). The preservation of pedodiversity is practically ignored by governments. The same can be said in the acceptance of geoparks by UNESCO, when soils are ignored. A few researchers have paid attention to geodiversity (Ibáñez et al., 2016; Stavi et al., 2016). In this study a data mining and metanalysis of this topic has been carried out using four different sources; Google, Google Scholar, Scopus, and the contents of Geoheritage journal. The results obtained show the same trends in all four studied sources. Soil resources are neglected in geodiversity studies as well as in the preservation of geological heritage against the scientific rationality inherent in the definition of geodiversity. Furthermore, pedodiversity studies have been carried out by a small set of interested pedologists following the same conceptual frames and mathematical tools reaching interesting universal patterns and a common language

  16. Mining on Big Data Using Hadoop MapReduce Model

    Science.gov (United States)

    Salman Ahmed, G.; Bhattacharya, Sweta

    2017-11-01

    Customary parallel calculations for mining nonstop item create opportunity to adjust stack of similar data among hubs. The paper aims to review this process by analyzing the critical execution downside of the common parallel recurrent item-set mining calculations. Given a larger than average dataset, data apportioning strategies inside the current arrangements endure high correspondence and mining overhead evoked by repetitive exchanges transmitted among registering hubs. We tend to address this downside by building up a learning apportioning approach referred as Hadoop abuse using the map-reduce programming model. All objectives of Hadoop are to zest up the execution of parallel recurrent item-set mining on Hadoop bunches. Fusing the comparability metric and furthermore the locality-sensitive hashing procedure, Hadoop puts to a great degree comparative exchanges into an information segment to lift neighborhood while not making AN exorbitant assortment of excess exchanges. We tend to execute Hadoop on a 34-hub Hadoop bunch, driven by a decent change of datasets made by IBM quest market-basket manufactured data generator. Trial uncovers the fact that Hadoop contributes towards lessening system and processing masses by the uprightness of dispensing with excess exchanges on Hadoop hubs. Hadoop impressively outperforms and enhances the other models considerably.

  17. Preservation of artifacts in salt mines as a natural analog for the storage of transuranic wastes at the WIPP repository

    International Nuclear Information System (INIS)

    Martell, M.A.; Hansen, F.; Weiner, R.

    1998-01-01

    Use of nature's laboratory for scientific analysis of complex systems is a largely untapped resource for understanding long-term disposal of hazardous materials. The Waste Isolation Pilot Plant (WIPP) in the US is a facility designed and approved for storage of transuranic waste in a salt medium. Isolation from the biosphere must be ensured for 10,000 years. Natural analogs provide a means to interpret the evolution of the underground disposal setting. Investigations of ancient sites where manmade materials have experienced mechanical and chemical processes over millennia provide scientific information unattainable by conventional laboratory methods. This paper presents examples of these pertinent natural analogs, provides examples of features relating to the WIPP application, and identifies potential avenues of future investigations. This paper cites examples of analogical information pertaining to the Hallstatt salt mine in Austria and Wieliczka salt mine in Poland. This paper intends to develop an appreciation for the applicability of natural analogs to the science and engineering of a long-term disposal facility in geomedia

  18. Preservation of artifacts in salt mines as a natural analog for the storage of transuranic wastes at the WIPP repository

    Energy Technology Data Exchange (ETDEWEB)

    Martell, M.A.; Hansen, F.; Weiner, R.

    1998-10-01

    Use of nature`s laboratory for scientific analysis of complex systems is a largely untapped resource for understanding long-term disposal of hazardous materials. The Waste Isolation Pilot Plant (WIPP) in the US is a facility designed and approved for storage of transuranic waste in a salt medium. Isolation from the biosphere must be ensured for 10,000 years. Natural analogs provide a means to interpret the evolution of the underground disposal setting. Investigations of ancient sites where manmade materials have experienced mechanical and chemical processes over millennia provide scientific information unattainable by conventional laboratory methods. This paper presents examples of these pertinent natural analogs, provides examples of features relating to the WIPP application, and identifies potential avenues of future investigations. This paper cites examples of analogical information pertaining to the Hallstatt salt mine in Austria and Wieliczka salt mine in Poland. This paper intends to develop an appreciation for the applicability of natural analogs to the science and engineering of a long-term disposal facility in geomedia.

  19. Interesting association rule mining with consistent and inconsistent rule detection from big sales data in distributed environment

    Directory of Open Access Journals (Sweden)

    Dinesh J. Prajapati

    2017-06-01

    Full Text Available Nowadays, there is an increasing demand in mining interesting patterns from the big data. The process of analyzing such a huge amount of data is really computationally complex task when using traditional methods. The overall purpose of this paper is in twofold. First, this paper presents a novel approach to identify consistent and inconsistent association rules from sales data located in distributed environment. Secondly, the paper also overcomes the main memory bottleneck and computing time overhead of single computing system by applying computations to multi node cluster. The proposed method initially extracts frequent itemsets for each zone using existing distributed frequent pattern mining algorithms. The paper also compares the time efficiency of Mapreduce based frequent pattern mining algorithm with Count Distribution Algorithm (CDA and Fast Distributed Mining (FDM algorithms. The association generated from frequent itemsets are too large that it becomes complex to analyze it. Thus, Mapreduce based consistent and inconsistent rule detection (MR-CIRD algorithm is proposed to detect the consistent and inconsistent rules from big data and provide useful and actionable knowledge to the domain experts. These pruned interesting rules also give useful knowledge for better marketing strategy as well. The extracted consistent and inconsistent rules are evaluated and compared based on different interestingness measures presented together with experimental results that lead to the final conclusions.

  20. MoDOT pavement preservation research program volume II, data collection for pavement management : historical data mining and production of data.

    Science.gov (United States)

    2015-10-01

    The objective of Task 1 was to develop data for use in MoDOTs pavement preservation program based primarily on historical : information available throughout MoDOT as well as climate data from the National Oceanic and Atmospheric Administration : (...

  1. APLIKASI DATA MINING MARKET BASKET ANALYSIS PADA TABEL DATA ABSENSI ELEKTRONIK UNTUK MENDETEKSI KECURANGAN ABSENSI (CHECK-LOCK KARYAWAN DI PERUSAHAAN

    Directory of Open Access Journals (Sweden)

    Gregorius Satia Budhi

    2007-01-01

    Full Text Available Taking attendance from employees always becomes a problem for Human Resource Department (HRD in many companies lately. Although there is an automatic check-lock machine, it still has a weakness. This machine can't detect some frauds like the employee swipes double identity card, his card and the others card. Reseachers want to solve this problem by using data mining method, especially market basket analysis.This software will transform the attendance data to compact transaction format by using MaxDiff Histogram method. And it will be processed into frequent itemset with Pincer Search Algoritm. At the final process the employee's association rule will got from frequent itemset. This output will be served to user that is the HRD of a firm.Testing result shows that Data Mining Market Basket Analysis can be used to get pattern of employee's check-lock from a company. And this pattern can help user to detect fraud that is done by employee. Abstract in Bahasa Indonesia : Absensi pegawai selama ini selalu menjadi permasalahan yang pelik bagi bagian HRD di perusahaan - perusahaan yang ada. Walaupun telah ada peralatan absensi otomatis, alat ini masih memiliki kelemahan yaitu, tidak dapat mendeteksi kecurangan pegawai untuk menitipkan kartu absensinya pada karyawan lain untuk diabsenkan. Peneliti berkeinginan untuk mengatasi permasalahan absensi tersebut dengan memanfaatkan metode data mining, khususnya metode market basket analysis, untuk mendeteksi kecurangan ini.Perangkat lunak yang dibuat ini akan mentranformasikan data absensi pegawai menggunakan metode MaxDiff Histogram menjadi format compact transaction yang selanjutnya akan diproses menggunakan Algoritma Pincer Search menjadi frequent itemset. Pada akhirnya dari data frequent itemset ini didapat association rule pegawai untuk disajikan kepada pengguna, yaitu bagian HRD perusahaan.Dari hasil pengujian dapat diketahui bahwa metode Data Mining Market Basket Analysis dapat dimanfaatkan untuk menggali

  2. Could the landscape preserve traces of a deep underground nuclear waste repository over the very long term? What we can learn from the archaeology of ancient mines

    International Nuclear Information System (INIS)

    Harmand, Dominique; BRULHET, Jacques

    2015-01-01

    Prof. Dominique Harmand presented a study conducted on behalf of Andra that focused on the archaeology of abandoned underground mines in order to illustrate how ancient human activities have left traces in the landscape. Old mines often have left some traces at surface such as slag heaps and parts of shafts over relatively long timescales, up to thousands of years. Geological disposal projects are equally likely to leave traces in the landscape over time. In the case of the French Cigeo project (Centre industriel de stockage geologique), research into the past and future geological evolution of the area shows that traces of heads of shafts and inclined tunnels, and filled excavations will likely still exist at surface in the distant future. However, as these traces could be confused with other human and natural traces of all ages, steps need to be taken to ensure that they are correctly interpreted. A suggested approach to facilitate the correct interpretation in the future consists in marking the site, and especially its long-lasting traces, with long-lived anthropological elements, such as small engraved ceramic pieces. These could be placed around the repository's surface buildings, but also in drill holes that would be a few metres deep. As a result of the natural erosion of the site, they would progressively reach the surface of the area in the long term

  3. Wood preservation

    Science.gov (United States)

    Kevin Archer; Stan Lebow

    2006-01-01

    Wood preservation can be interpreted to mean protection from fire, chemical degradation, mechanical wear, weathering, as well as biological attack. In this chapter, the term preservation is applied more restrictively to protection from biological hazards.

  4. The mining methods at the Fraisse mine

    International Nuclear Information System (INIS)

    Heurley, P.; Vervialle, J.P.

    1985-01-01

    The Fraisse mine is one of the four underground mines of the La Crouzille mining divisions of Cogema. Faced with the necessity to mechanize its workings, this mine also had to satisfy a certain number of stringent demands. This has led to concept of four different mining methods for the four workings at present in active operation at this pit, which nevertheless preserve the basic ideas of the methods of top slicing under concrete slabs (TSS) or horizontal cut-and-fill stopes (CFS). An electric scooptram is utilized. With this type of vehicle the stringent demands for the introduction of means for fire fighting and prevention are reduced to a minimum. Finally, the dimensions of the vehicles and the operation of these methods result in a net-to-gross tonnages of close to 1, i.e. a maximum output, combined with a minimum of contamination [fr

  5. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  6. Digital preservation

    CERN Document Server

    Deegan, Marilyn

    2013-01-01

    Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss

  7. Urine Preservative

    Science.gov (United States)

    Smith, Scott M. (Inventor); Nillen, Jeannie (Inventor)

    2001-01-01

    Disclosed is CPG, a combination of a chlorhexidine salt (such as chlorhexidine digluconate, chlorhexidine diacetate, or chlorhexidine dichloride) and n-propyl gallate that can be used at ambient temperatures as a urine preservative.

  8. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  9. RANWAR: rank-based weighted association rule mining from gene expression and methylation data.

    Science.gov (United States)

    Mallik, Saurav; Mukhopadhyay, Anirban; Maulik, Ujjwal

    2015-01-01

    Ranking of association rules is currently an interesting topic in data mining and bioinformatics. The huge number of evolved rules of items (or, genes) by association rule mining (ARM) algorithms makes confusion to the decision maker. In this article, we propose a weighted rule-mining technique (say, RANWAR or rank-based weighted association rule-mining) to rank the rules using two novel rule-interestingness measures, viz., rank-based weighted condensed support (wcs) and weighted condensed confidence (wcc) measures to bypass the problem. These measures are basically depended on the rank of items (genes). Using the rank, we assign weight to each item. RANWAR generates much less number of frequent itemsets than the state-of-the-art association rule mining algorithms. Thus, it saves time of execution of the algorithm. We run RANWAR on gene expression and methylation datasets. The genes of the top rules are biologically validated by Gene Ontologies (GOs) and KEGG pathway analyses. Many top ranked rules extracted from RANWAR that hold poor ranks in traditional Apriori, are highly biologically significant to the related diseases. Finally, the top rules evolved from RANWAR, that are not in Apriori, are reported.

  10. Multiagent data warehousing and multiagent data mining for cerebrum/cerebellum modeling

    Science.gov (United States)

    Zhang, Wen-Ran

    2002-03-01

    An algorithm named Neighbor-Miner is outlined for multiagent data warehousing and multiagent data mining. The algorithm is defined in an evolving dynamic environment with autonomous or semiautonomous agents. Instead of mining frequent itemsets from customer transactions, the new algorithm discovers new agents and mining agent associations in first-order logic from agent attributes and actions. While the Apriori algorithm uses frequency as a priory threshold, the new algorithm uses agent similarity as priory knowledge. The concept of agent similarity leads to the notions of agent cuboid, orthogonal multiagent data warehousing (MADWH), and multiagent data mining (MADM). Based on agent similarities and action similarities, Neighbor-Miner is proposed and illustrated in a MADWH/MADM approach to cerebrum/cerebellum modeling. It is shown that (1) semiautonomous neurofuzzy agents can be identified for uniped locomotion and gymnastic training based on attribute relevance analysis; (2) new agents can be discovered and agent cuboids can be dynamically constructed in an orthogonal MADWH, which resembles an evolving cerebrum/cerebellum system; and (3) dynamic motion laws can be discovered as association rules in first order logic. Although examples in legged robot gymnastics are used to illustrate the basic ideas, the new approach is generally suitable for a broad category of data mining tasks where knowledge can be discovered collectively by a set of agents from a geographically or geometrically distributed but relevant environment, especially in scientific and engineering data environments.

  11. Emittance preservation

    Energy Technology Data Exchange (ETDEWEB)

    Kain, V; Arduini, G; Goddard, B; Holzer, B J; Jowett, J M; Meddahi, M; Mertens, T; Roncarolo, F; Schaumann, M; Versteegen, R; Wenninger, J [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    Emittance measurements during the LHC proton run 2011 indicated a blow-up of 20 % to 30 % from LHC injection to collisions. This presentation will show the emittance preservation throughout the different parts of the LHC cycle and discuss the current limitations on emittance determination. An overview of emittance preservation through the injector complex as function of bunch intensity will also be given. Possible sources for the observed blow-up and required tests in 2012 will be presented. Possible improvements of emittance diagnostics and analysis tools for 2012 will be shown.

  12. Privacy-Preserving Collaborative Sequential Pattern Mining

    National Research Council Canada - National Science Library

    Zhan, Justin Z; Chang, LiWu; Matwin, Stan

    2004-01-01

    .... During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be easily achieved...

  13. An Integrative data mining approach to identifying Adverse ...

    Science.gov (United States)

    The Adverse Outcome Pathway (AOP) framework is a tool for making biological connections and summarizing key information across different levels of biological organization to connect biological perturbations at the molecular level to adverse outcomes for an individual or population. Computational approaches to explore and determine these connections can accelerate the assembly of AOPs. By leveraging the wealth of publicly available data covering chemical effects on biological systems, computationally-predicted AOPs (cpAOPs) were assembled via data mining of high-throughput screening (HTS) in vitro data, in vivo data and other disease phenotype information. Frequent Itemset Mining (FIM) was used to find associations between the gene targets of ToxCast HTS assays and disease data from Comparative Toxicogenomics Database (CTD) by using the chemicals as the common aggregators between datasets. The method was also used to map gene expression data to disease data from CTD. A cpAOP network was defined by considering genes and diseases as nodes and FIM associations as edges. This network contained 18,283 gene to disease associations for the ToxCast data and 110,253 for CTD gene expression. Two case studies show the value of the cpAOP network by extracting subnetworks focused either on fatty liver disease or the Aryl Hydrocarbon Receptor (AHR). The subnetwork surrounding fatty liver disease included many genes known to play a role in this disease. When querying the cpAOP

  14. Trust Mines

    Science.gov (United States)

    The United States and the Navajo Nation entered into settlement agreements that provide funds to conduct investigations and any needed cleanup at 16 of the 46 priority mines, including six mines in the Northern Abandoned Uranium Mine Region.

  15. PEMBUATAN PERANGKAT LUNAK DATA MINING UNTUK PENGGALIAN KAIDAH ASOSIASI MENGGUNAKAN METODE APRIORI

    Directory of Open Access Journals (Sweden)

    Leo Willyanto Santoso

    2003-01-01

    Full Text Available There are many theories and approaches that have been developed to find pattern and association rule. One of the methods that have been developed is apriori method. Any method previously finds itemset using graph approaches that have weakness on huge memory usage. The lack of memory will affect many item that able to process. Further, many approaches use internal data structure that very complex and need resource addition to do this computation. In this research, apriori method was used to get association rule that describe relation between items in transactional database. The database that used is three kinds that have different in total transactional. Based on the empirical test, can be concluded that computational time to get asociation rule is influenced by the number of transaction and using "tidlist" data structure in apriori methods can reduce time because only read database one time. Abstract in Bahasa Indonesia : Banyak teori dan pendekatan yang dikembangkan untuk memperoleh hasil penemuan kaidah asosiasi dan pola. Salah satu metode yang dikembangkan yaitu dengan menggunakan metode apriori. Beberapa dari metode sebelumnya melakukan pencarian itemset dengan pendekatan graf asosiasi yang memiliki kelemahan pada penggunaan memori yang besar. Keterbatasan memori jelas akan mempengaruhi banyaknya item yang bisa diproses. Lebih jauh lagi, sebagian besar pendekatan menggunakan struktur data internal sangat rumit yang tidak bersifat lokal dan membutuhkan tambahan sumber daya dan banyak komputasi. Pada riset ini, metode apriori digunakan untuk memperoleh kaidah asosiasi yang menggambarkan hubungan antar item pada database transaksional. Database yang digunakan ada tiga buah yang masing-masing memiliki jumlah transaksi yang berbeda. Dari hasil pengujian empiris dapat ditarik kesimpulan bahwa waktu komputasi untuk menghasilkan kaidah asosiasi dipengaruhi oleh jumlah transaksi dan Penggunaan struktur data "tidlist" pada algoritma apriori

  16. Preservation Benefits Geoscientific Investigations Across the Nation

    Science.gov (United States)

    Powers, L. A.; Latysh, N.

    2017-12-01

    Since 2005, the National Geological and Geophysical Data Preservation Program (NGGDPP) of the U.S. Geological Survey (USGS) has distributed financial grants to state geological surveys to preserve, archive, and make available valuable geoscientific samples and data to researchers and the public. States have cataloged and preserved materials that include geophysical logs, geotechnical reports, fragile historical documents, maps, geologic samples, and legacy aerial and field-investigation photographs. Approximately 3 million metadata records describing preserved data and artifacts are cataloged in the National Digital Catalog, a component of the USGS ScienceBase data management infrastructure. Providing a centralized domain in the National Digital Catalog for uniformly described records has enabled discovery of important geoscientific assets across the Nation. Scientific investigations continue to be informed by preserved materials and data. Tennessee Geological Survey's preserved collection of historical documents describing coal mining activities in the State was used to identify vulnerable areas overlying abandoned underground coal mines, which caused surface collapses and sinkholes in populated areas. Missouri Geological Survey's preserved collection of legacy field notebooks was used to identify thousands of abandoned mines, many of which have significant soil or groundwater lead contamination and are located in areas that now have residential development. The information enabled the evaluation of risk to human health, environment, and infrastructure and identification of needed remedial actions. Information in the field notebooks also assisted the Missouri Department of Transportation responding to highway collapses and assessing collapse potential in abandoned coal mining lands. Digitization of natural gamma ray logs allowed Minnesota Geological Survey staff to directly access well data in the field, accelerating the ability to address geoscientific questions

  17. Privacy preserving data publishing with multiple sensitive attributes

    OpenAIRE

    Abdalaal, Ahmed Fuad

    2012-01-01

    Data mining is the process of extracting hidden predictive information from large databases, it has a great potential to help governments, researchers and companies focus on the most significant information in their data warehouses. High quality data and effective data publishing are needed to gain a high impact from data mining process. However there is a clear need to preserve individual privacy in the released data. Privacy-preserving data publishing is a research topic of eliminating priv...

  18. Mine drivage in hydraulic mines

    Energy Technology Data Exchange (ETDEWEB)

    Ehkber, B Ya

    1983-09-01

    From 20 to 25% of labor cost in hydraulic coal mines falls on mine drivage. Range of mine drivage is high due to the large number of shortwalls mined by hydraulic monitors. Reducing mining cost in hydraulic mines depends on lowering drivage cost by use of new drivage systems or by increasing efficiency of drivage systems used at present. The following drivage methods used in hydraulic mines are compared: heading machines with hydraulic haulage of cut rocks and coal, hydraulic monitors with hydraulic haulage, drilling and blasting with hydraulic haulage of blasted rocks. Mining and geologic conditions which influence selection of the optimum mine drivage system are analyzed. Standardized cross sections of mine roadways driven by the 3 methods are shown in schemes. Support systems used in mine roadways are compared: timber supports, roof bolts, roof bolts with steel elements, and roadways driven in rocks without a support system. Heading machines (K-56MG, GPKG, 4PU, PK-3M) and hydraulic monitors (GMDTs-3M, 12GD-2) used for mine drivage are described. Data on mine drivage in hydraulic coal mines in the Kuzbass are discussed. From 40 to 46% of roadways are driven by heading machines with hydraulic haulage and from 12 to 15% by hydraulic monitors with hydraulic haulage.

  19. Control of borens in mine timbers

    Energy Technology Data Exchange (ETDEWEB)

    Yule, R A; Kennedy, M J

    1978-07-01

    The authors studied timber attack in Queensland mines by auger beetles and powder post beetles. When infested timber is taken into a mine the insects thrive at the temperatures (20 to 25 C) and relative humidities (70-90%) they encounter. Seven timber treatments were tested, and all were satisfactory except spraying with wood-preserving oil which contained a moderately effective insecticide.

  20. Web Mining

    Science.gov (United States)

    Fürnkranz, Johannes

    The World-Wide Web provides every internet citizen with access to an abundance of information, but it becomes increasingly difficult to identify the relevant pieces of information. Research in web mining tries to address this problem by applying techniques from data mining and machine learning to Web data and documents. This chapter provides a brief overview of web mining techniques and research areas, most notably hypertext classification, wrapper induction, recommender systems and web usage mining.

  1. Text Mining.

    Science.gov (United States)

    Trybula, Walter J.

    1999-01-01

    Reviews the state of research in text mining, focusing on newer developments. The intent is to describe the disparate investigations currently included under the term text mining and provide a cohesive structure for these efforts. A summary of research identifies key organizations responsible for pushing the development of text mining. A section…

  2. Surface mining

    Science.gov (United States)

    Robert Leopold; Bruce Rowland; Reed Stalder

    1979-01-01

    The surface mining process consists of four phases: (1) exploration; (2) development; (3) production; and (4) reclamation. A variety of surface mining methods has been developed, including strip mining, auger, area strip, open pit, dredging, and hydraulic. Sound planning and design techniques are essential to implement alternatives to meet the myriad of laws,...

  3. Uranium mining

    International Nuclear Information System (INIS)

    Lange, G.

    1975-01-01

    The winning of uranium ore is the first stage of the fuel cycle. The whole complex of questions to be considered when evaluating the profitability of an ore mine is shortly outlined, and the possible mining techniques are described. Some data on uranium mining in the western world are also given. (RB) [de

  4. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  5. Contract Mining versus Owner Mining

    African Journals Online (AJOL)

    Owner

    mining companies can concentrate on their core businesses while using specialists for ... 2 Definition of Contract and Owner. Mining ... equipment maintenance, scheduling and budgeting ..... No. Region. Amount Spent on. Contract Mining. ($ billion). Percent of. Total. 1 ... cost and productivity data based on a large range.

  6. Mining Context-Aware Association Rules Using Grammar-Based Genetic Programming.

    Science.gov (United States)

    Luna, Jose Maria; Pechenizkiy, Mykola; Del Jesus, Maria Jose; Ventura, Sebastian

    2017-09-25

    Real-world data usually comprise features whose interpretation depends on some contextual information. Such contextual-sensitive features and patterns are of high interest to be discovered and analyzed in order to obtain the right meaning. This paper formulates the problem of mining context-aware association rules, which refers to the search for associations between itemsets such that the strength of their implication depends on a contextual feature. For the discovery of this type of associations, a model that restricts the search space and includes syntax constraints by means of a grammar-based genetic programming methodology is proposed. Grammars can be considered as a useful way of introducing subjective knowledge to the pattern mining process as they are highly related to the background knowledge of the user. The performance and usefulness of the proposed approach is examined by considering synthetically generated datasets. A posteriori analysis on different domains is also carried out to demonstrate the utility of this kind of associations. For example, in educational domains, it is essential to identify and understand contextual and context-sensitive factors that affect overall and individual student behavior and performance. The results of the experiments suggest that the approach is feasible and it automatically identifies interesting context-aware associations from real-world datasets.

  7. Mine Water Treatment in Hongai Coal Mines

    OpenAIRE

    Dang Phuong Thao; Dang Vu Chi

    2018-01-01

    Acid mine drainage (AMD) is recognized as one of the most serious environmental problem associated with mining industry. Acid water, also known as acid mine drainage forms when iron sulfide minerals found in the rock of coal seams are exposed to oxidizing conditions in coal mining. Until 2009, mine drainage in Hongai coal mines was not treated, leading to harmful effects on humans, animals and aquatic ecosystem. This report has examined acid mine drainage problem and techniques for acid mine ...

  8. Extending mine life

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    Mine layouts, new machines and techniques, research into problem areas of ground control and so on, are highlighted in this report on extending mine life. The main resources taken into account are coal mining, uranium mining, molybdenum and gold mining

  9. Uranium mining

    International Nuclear Information System (INIS)

    2008-01-01

    Full text: The economic and environmental sustainability of uranium mining has been analysed by Monash University researcher Dr Gavin Mudd in a paper that challenges the perception that uranium mining is an 'infinite quality source' that provides solutions to the world's demand for energy. Dr Mudd says information on the uranium industry touted by politicians and mining companies is not necessarily inaccurate, but it does not tell the whole story, being often just an average snapshot of the costs of uranium mining today without reflecting the escalating costs associated with the process in years to come. 'From a sustainability perspective, it is critical to evaluate accurately the true lifecycle costs of all forms of electricity production, especially with respect to greenhouse emissions, ' he says. 'For nuclear power, a significant proportion of greenhouse emissions are derived from the fuel supply, including uranium mining, milling, enrichment and fuel manufacture.' Dr Mudd found that financial and environmental costs escalate dramatically as the uranium ore is used. The deeper the mining process required to extract the ore, the higher the cost for mining companies, the greater the impact on the environment and the more resources needed to obtain the product. I t is clear that there is a strong sensitivity of energy and water consumption and greenhouse emissions to ore grade, and that ore grades are likely to continue to decline gradually in the medium to long term. These issues are critical to the current debate over nuclear power and greenhouse emissions, especially with respect to ascribing sustainability to such activities as uranium mining and milling. For example, mining at Roxby Downs is responsible for the emission of over one million tonnes of greenhouse gases per year and this could increase to four million tonnes if the mine is expanded.'

  10. Privacy-Preserving Restricted Boltzmann Machine

    Directory of Open Access Journals (Sweden)

    Yu Li

    2014-01-01

    Full Text Available With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM. The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  11. Social big data mining

    CERN Document Server

    Ishikawa, Hiroshi

    2015-01-01

    Social Media. Big Data and Social Data. Hypotheses in the Era of Big Data. Social Big Data Applications. Basic Concepts in Data Mining. Association Rule Mining. Clustering. Classification. Prediction. Web Structure Mining. Web Content Mining. Web Access Log Mining, Information Extraction and Deep Web Mining. Media Mining. Scalability and Outlier Detection.

  12. Mine Water Treatment in Hongai Coal Mines

    Science.gov (United States)

    Dang, Phuong Thao; Dang, Vu Chi

    2018-03-01

    Acid mine drainage (AMD) is recognized as one of the most serious environmental problem associated with mining industry. Acid water, also known as acid mine drainage forms when iron sulfide minerals found in the rock of coal seams are exposed to oxidizing conditions in coal mining. Until 2009, mine drainage in Hongai coal mines was not treated, leading to harmful effects on humans, animals and aquatic ecosystem. This report has examined acid mine drainage problem and techniques for acid mine drainage treatment in Hongai coal mines. In addition, selection and criteria for the design of the treatment systems have been presented.

  13. Mine Water Treatment in Hongai Coal Mines

    Directory of Open Access Journals (Sweden)

    Dang Phuong Thao

    2018-01-01

    Full Text Available Acid mine drainage (AMD is recognized as one of the most serious environmental problem associated with mining industry. Acid water, also known as acid mine drainage forms when iron sulfide minerals found in the rock of coal seams are exposed to oxidizing conditions in coal mining. Until 2009, mine drainage in Hongai coal mines was not treated, leading to harmful effects on humans, animals and aquatic ecosystem. This report has examined acid mine drainage problem and techniques for acid mine drainage treatment in Hongai coal mines. In addition, selection and criteria for the design of the treatment systems have been presented.

  14. Analysis Of Data Mining For Car Sales Sparepart Using Apriori Algorithm (Case Study: PT. IDK 1 FIELD

    Directory of Open Access Journals (Sweden)

    Khairul Ummi

    2016-10-01

    Full Text Available PT. IDK 1 is one of the branch offices honda car dealership that sells various types of variants honda matic or manual car and motorcycle parts. Any sales or goods sold will be performed by inputting the database directly connected directly to the central office. But PT. IDK 1 do not know a couple items frequently purchased parts simultaneously. When the stock of spare parts which amount is low, the office is only asking them to send the stock of spare parts from the central office without knowing that the other parts if the parts were purchased then the other parts were also purchased. It was considered difficult when restocking of goods because of the many types of auto parts. Data mining techniques have been widely used to solve the existing problems with the implementation of the algorithm one A-Priori to obtain information about the association between the product of a database transaction. Sales transaction data honda car parts at PT. IDK 1 can be reprocessed using data mining applications resulting association rules is a strong link between itemset sales of spare parts so that it can provide recommendations and facilitate restocking items in the arrangement or placement of goods related to a strong interdependence.

  15. Potential for mine water reuse in an abandoned coal mine in northern Spain

    Energy Technology Data Exchange (ETDEWEB)

    Marques, A.; Garcia-Ordiales, E.; Loredo, J. [Oviedo Univ., Asturias (Spain)

    2010-07-01

    This paper investigated the potential re-utilization of mine water in industrial activities. Mine water characterization studies were conducted to evaluate mine waters from the abandoned La Camocha Mine in northwestern Spain. Hydrochemical studies have indicated that the water is bicarbonated with a low sulphate and iron content, and a neutral pH. The concentrations of trace metals are below water legislation for human consumption levels. The water can economically be transported for use in the irrigation of a botanical garden and sports centre located in the same region as the mine. Use of the water will help to preserve rivers and other waterways in the region, and may also minimize the environmental impacts of pumping activities at the mine. Fluid properties for various water samples were provided. 6 refs., 1 tab., 3 figs.

  16. Coastal mining

    Science.gov (United States)

    Bell, Peter M.

    The Exclusive Economic Zone (EEZ) declared by President Reagan in March 1983 has met with a mixed response from those who would benefit from a guaranteed, 200-nautical-mile (370-km) protected underwater mining zone off the coasts of the United States and its possessions. On the one hand, the U.S. Department of the Interior is looking ahead and has been very successful in safeguarding important natural resources that will be needed in the coming decades. On the other hand, the mining industry is faced with a depressed metals and mining market.A report of the Exclusive Economic Zone Symposium held in November 1983 by the U.S. Geological Survey, the Mineral Management Service, and the Bureau of Mines described the mixed response as: “ … The Department of Interior … raring to go into promotion of deep-seal mining but industrial consortia being very pessimistic about the program, at least for the next 30 or so years.” (Chemical & Engineering News, February 5, 1983).

  17. Surface Mines, Other - Longwall Mining Panels

    Data.gov (United States)

    NSGIC Education | GIS Inventory — Coal mining has occurred in Pennsylvania for over a century. A method of coal mining known as Longwall Mining has become more prevalent in recent decades. Longwall...

  18. Process mining

    DEFF Research Database (Denmark)

    van der Aalst, W.M.P.; Rubin, V.; Verbeek, H.M.W.

    2010-01-01

    Process mining includes the automated discovery of processes from event logs. Based on observed events (e.g., activities being executed or messages being exchanged) a process model is constructed. One of the essential problems in process mining is that one cannot assume to have seen all possible...... behavior. At best, one has seen a representative subset. Therefore, classical synthesis techniques are not suitable as they aim at finding a model that is able to exactly reproduce the log. Existing process mining techniques try to avoid such “overfitting” by generalizing the model to allow for more...... support for it). None of the existing techniques enables the user to control the balance between “overfitting” and “underfitting”. To address this, we propose a two-step approach. First, using a configurable approach, a transition system is constructed. Then, using the “theory of regions”, the model...

  19. Data mining

    CERN Document Server

    Gorunescu, Florin

    2011-01-01

    The knowledge discovery process is as old as Homo sapiens. Until some time ago, this process was solely based on the 'natural personal' computer provided by Mother Nature. Fortunately, in recent decades the problem has begun to be solved based on the development of the Data mining technology, aided by the huge computational power of the 'artificial' computers. Digging intelligently in different large databases, data mining aims to extract implicit, previously unknown and potentially useful information from data, since 'knowledge is power'. The goal of this book is to provide, in a friendly way

  20. Mining wastes

    International Nuclear Information System (INIS)

    Pradel, J.

    1981-01-01

    In this article mining wastes means wastes obtained during extraction and processing of uranium ores including production of uraniferous concentrates. The hazards for the population are irradiation, ingestion, dust or radon inhalation. The different wastes produced are reviewed. Management of liquid effluents, water treatment, contamined materials, gaseous wastes and tailings are examined. Environmental impact of wastes during and after exploitation is discussed. Monitoring and measurements are made to verify that ICRP recommendations are met. Studies in progress to improve mining waste management are given [fr

  1. Preserving Digital Materials

    CERN Document Server

    Harvey, Ross

    2011-01-01

    This book provides a single-volume introduction to the principles, strategies and practices currently applied by librarians and recordkeeping professionals to the critical issue of preservation of digital information. It incorporates practice from both the recordkeeping and the library communities, taking stock of current knowledge about digital preservation and describing recent and current research, to provide a framework for reflecting on the issues that digital preservation raises in professional practice.

  2. Mining Method

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Shik; Lee, Kyung Woon; Kim, Oak Hwan; Kim, Dae Kyung [Korea Institute of Geology Mining and Materials, Taejon (Korea, Republic of)

    1996-12-01

    The reducing coal market has been enforcing the coal industry to make exceptional rationalization and restructuring efforts since the end of the eighties. To the competition from crude oil and natural gas has been added the growing pressure from rising wages and rising production cost as the workings get deeper. To improve the competitive position of the coal mines against oil and gas through cost reduction, studies to improve mining system have been carried out. To find fields requiring improvements most, the technologies using in Tae Bak Colliery which was selected one of long running mines were investigated and analyzed. The mining method appeared the field needing improvements most to reduce the production cost. The present method, so-called inseam roadway caving method presently is using to extract the steep and thick seam. However, this method has several drawbacks. To solve the problems, two mining methods are suggested for a long term and short term method respectively. Inseam roadway caving method with long-hole blasting method is a variety of the present inseam roadway caving method modified by replacing timber sets with steel arch sets and the shovel loaders with chain conveyors. And long hole blasting is introduced to promote caving. And pillar caving method with chock supports method uses chock supports setting in the cross-cut from the hanging wall to the footwall. Two single chain conveyors are needed. One is installed in front of chock supports to clear coal from the cutting face. The other is installed behind the supports to transport caved coal from behind. This method is superior to the previous one in terms of safety from water-inrushes, production rate and productivity. The only drawback is that it needs more investment. (author). 14 tabs., 34 figs.

  3. A Mining Algoritm of Maximum Frequent Itemsets and Updating Based on Matrix%基于矩阵的最大频繁模式挖掘及其更新算法

    Institute of Scientific and Technical Information of China (English)

    吴聪聪; 李忠哗; 何丕廉

    2007-01-01

    提出了一种基于矩阵的挖掘最大频繁模式的算法(FPA),只需扫描数据集一遍,不生成候选项目集.在实际应用中用户经常需要调整最小支持度阀值获得信息,为此,提出了更新挖掘算法(UFPA).实验结果表明.这两个算法具有很好性能.

  4. A Fast Mining Algoritm of Maximum Frequent Itemsets Based on F-matrix%一种基于F-矩阵的最大频繁项目集快速挖掘算法

    Institute of Scientific and Technical Information of China (English)

    杨萍

    2003-01-01

    最大频繁项目集挖掘是多种数据挖掘应用研究的一个重要方面,最大频繁项目集的快速挖掘算法研究是当前研究的热点.传统的最大频繁项目集挖掘算法要多遍扫描数据库并产生大量的候选项目集.为此,该文提出了基于F-矩阵的最大频繁项目集快速挖掘算法FMMFIBFM,FMMFIBFM采用FP-tree的存储结构,仅须扫描数据库两遍且不产生候选频繁项目集,有效地提高了频繁项目集的挖掘效率.实验结果表明,FMMFIBFM算法是有效可行的.

  5. Environmental education on wood preservatives and preservative ...

    African Journals Online (AJOL)

    The development and use of wood preservatives in Nigeria should address not only the cost and demand functions but also the potential hazards in environmental equations. Forest products specialists are often asked about the perceived risks and environmental costs of treated wood products. Evidently, the civil society is ...

  6. Mass preserving image registration

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2010-01-01

    The paper presents results the mass preserving image registration method in the Evaluation of Methods for Pulmonary Image Registration 2010 (EMPIRE10) Challenge. The mass preserving image registration algorithm was applied to the 20 image pairs. Registration was evaluated using four different...

  7. Modes of fossil preservation

    Science.gov (United States)

    Schopf, J.M.

    1975-01-01

    The processes of geologic preservation are important for understanding the organisms represented by fossils. Some fossil differences are due to basic differences in organization of animals and plants, but the interpretation of fossils has also tended to be influenced by modes of preservation. Four modes of preservation generally can be distinguished: (1) Cellular permineralization ("petrifaction") preserves anatomical detail, and, occasionally, even cytologic structures. (2) Coalified compression, best illustrated by structures from coal but characteristic of many plant fossils in shale, preserves anatomical details in distorted form and produces surface replicas (impressions) on enclosing matrix. (3) Authigenic preservation replicates surface form or outline (molds and casts) prior to distortion by compression and, depending on cementation and timing, may intergrade with fossils that have been subject to compression. (4) Duripartic (hard part) preservation is characteristic of fossil skeletal remains, predominantly animal. Molds, pseudomorphs, or casts may form as bulk replacements following dissolution of the original fossil material, usually by leaching. Classification of the kinds of preservation in fossils will aid in identifying the processes responsible for modifying the fossil remains of both animals and plants. ?? 1975.

  8. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Labots, H.; Huis in 't Veld, G.J.P.; Verrips, C.T.

    1985-01-01

    After a review of several methods for the preservation of food and the routes of food infections, the following chapters are devoted to the preservation by irradiation. Applications and legal aspects of food irradiation are described. Special reference is made to the international situation. (Auth.)

  9. Self-preserving cosmetics.

    Science.gov (United States)

    Varvaresou, A; Papageorgiou, S; Tsirivas, E; Protopapa, E; Kintziou, H; Kefala, V; Demetzos, C

    2009-06-01

    Preservatives are added to products for two reasons: first, to prevent microbial spoilage and therefore to prolong the shelf life of the product; second, to protect the consumer from a potential infection. Although chemical preservatives prevent microbial growth, their safety is questioned by a growing segment of consumers. Therefore, there is a considerable interest in the development of preservative-free or self-preserving cosmetics. In these formulations traditional/chemical preservatives have been replaced by other cosmetic ingredients with antimicrobial properties that are not legislated as preservatives according to the Annex VI of the Commission Directive 76/768/EEC and the amending directives (2003/15/EC, 2007/17/EC and 2007/22/EC). 'Hurdle Technology', a technology that has been used for the control of product safety in the food industry since 1970s, has also been applied for the production of self-preserving cosmetics. 'Hurdle Technology' is a term used to describe the intelligent combination of different preservation factors or hurdles to deteriorate the growth of microorganisms. Adherence to current good manufacturing practice, appropriate packaging, careful choice of the form of the emulsion, low water activity and low or high pH values are significant variables for the control of microbial growth in cosmetic formulations. This paper describes the application of the basic principles of 'Hurdle Technology' in the production of self-preserving cosmetics. Multifunctional antimicrobial ingredients and plant-derived essential oils and extracts that are used as alternative or natural preservatives and are not listed in Annex VI of the Cosmetic Directive are also reported.

  10. Mine games

    Energy Technology Data Exchange (ETDEWEB)

    Patchett, A. [Hitachi Construction Equipment (United Kingdom)

    2006-09-15

    The article describes various excavators used in the UK by Hall Construction for coal mining and reclamation projects. They include machines from Hitachi Construction Machinery that have been modified with a coal shovel at the front end. The ZX350LC-3, for example incorporates a coal shovel, manufactured by Kocurek, to allow it to work at the rock face and lift coal into road wagons or dump trucks. 5 figs.

  11. A clean environment approach to uranium mining

    International Nuclear Information System (INIS)

    Grancea, Luminita

    2015-01-01

    A global and multi-faceted response to climate change is essential if meaningful and cost-effective progress is to be made in reducing the effects of climate change around the world. There is no doubt that the uranium mining sector has an important role to play in such a goal. Uranium is the raw material used to produce fuel for long-lived nuclear facilities, necessary for the generation of significant amounts of baseload low-carbon electricity for decades to come. Given expectations of growth in nuclear generating capacity and the associated uranium demand, enhancing awareness of leading practices in uranium mining is indispensable. Actors in the uranium mining sector operate in a complex world, throughout different geographies, and involving global supply chains. They manage climate-sensitive water, land and energy resources and balance the interests of various stakeholders. Managed well, uranium mining delivers sustainable value for economic growth, employment and infrastructure, with specific attention given to the preservation of the environment. In the early phases of the industry, however, downside risks existed, which created legacy environmental and health issues that still can be recalled today. This article addresses key aspects of modern uranium mining operations that have been introduced as regulations and practices have evolved in response to societal attitudes about health, safety and environmental protection. Such aspects of mine management were seldom, if ever, respected in the early stages of uranium mining. With the implementation of modern mine lifecycle parameters and regulatory requirements, uranium mining has become a leader in safety and environmental management. Today, uranium mining is conducted under significantly different circumstances and is now the most regulated and one of the safest forms of mining in the world. Experiences from modern uranium mines show that successful companies develop innovative strategies to manage all the

  12. Chronopolis Digital Preservation Network

    Directory of Open Access Journals (Sweden)

    David Minor

    2010-07-01

    Full Text Available The Chronopolis Digital Preservation Initiative, one of the Library of Congress’ latest efforts to collect and preserve at-risk digital information, has completed its first year of service as a multi-member partnership to meet the archival needs of a wide range of domains.Chronopolis is a digital preservation data grid framework developed by the San Diego Supercomputer Center (SDSC at UC San Diego, the UC San Diego Libraries (UCSDL, and their partners at the National Center for Atmospheric Research (NCAR in Colorado and the University of Maryland's Institute for Advanced Computer Studies (UMIACS.Chronopolis addresses a critical problem by providing a comprehensive model for the cyberinfrastructure of collection management, in which preserved intellectual capital is easily accessible, and research results, education material, and new knowledge can be incorporated smoothly over the long term. Integrating digital library, data grid, and persistent archive technologies, Chronopolis has created trusted environments that span academic institutions and research projects, with the goal of long-term digital preservation.A key goal of the Chronopolis project is to provide cross-domain collection sharing for long-term preservation. Using existing high-speed educational and research networks and mass-scale storage infrastructure investments, the partnership is leveraging the data storage capabilities at SDSC, NCAR, and UMIACS to provide a preservation data grid that emphasizes heterogeneous and highly redundant data storage systems.In this paper we will explore the major themes within Chronopolis, including:a The philosophy and theory behind a nationally federated data grid for preservation. b The core tools and technologies used in Chronopolis. c The metadata schema that is being developed within Chronopolis for all of the data elements. d Lessons learned from the first year of the project.e Next steps in digital preservation using Chronopolis: how we

  13. Optimization of preservation activities and preservation engineering (1)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the relation between general society and preservation, the content and the structure of preservation activities, and the viewpoint and the approach of the optimization of the preventive preservation are described. The optimization of the preventive preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  14. VT Historic Preservation Grant

    Data.gov (United States)

    Vermont Center for Geographic Information — The State-funded Historic Preservation Grant Program helps municipalities and non-profit organizations rehabilitate the historic buildings that are a vital part of...

  15. Preservation of Built Environments

    DEFF Research Database (Denmark)

    Pilegaard, Marie Kirstine

    When built environments and recently also cultural environments are to be preserved, the historic and architectural values are identified as the key motivations. In Denmark the SAVE system is used as a tool to identify architectural values, but in recent years it has been criticized for having...... architectural value in preservation work as a matter of maintaining the buildings -as keeping them "alive" and allowing this to continue in the future. The predominantly aesthetic preservation approach will stop the buildings' life process, which is the same as - "letting them die". Finnebyen in Aarhus...... is an example of a residential area, where the planning authority currently has presented a preservational district plan, following guidelines from the SAVE method. The purpose is to protect the area's architectural values in the future. The predominantly aesthetic approach is here used coupled to the concept...

  16. Radiation preservation of maize

    International Nuclear Information System (INIS)

    Wasito.

    1980-01-01

    Radiation preservation of maize was carried out. Radiation doses and sources, shielding materials, packaging materials, chemical radiation effects, biological radiation effects, were discussed. Experimental methods, samples and accessories were also presented. (SMN)

  17. Exploration and Mining Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2002-09-01

    This Exploration and Mining Technology Roadmap represents the third roadmap for the Mining Industry of the Future. It is based upon the results of the Exploration and Mining Roadmap Workshop held May 10 ñ 11, 2001.

  18. Ghana Mining Journal

    African Journals Online (AJOL)

    ... in the Ghana mining journal: Geology and Mineral Exploration, Mining, Quarrying, Geomechanics, Groundwater Studies, Hydrocarbon Development, Mineral Processing, Metallurgy, Material Science, Mineral Management Policies, Mineral Economics, Environmental Aspects, Computer Applications and Mining Education.

  19. Coal Mine Permit Boundaries

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — ESRI ArcView shapefile depicting New Mexico coal mines permitted under the Surface Mining Control and Reclamation Act of 1977 (SMCRA), by either the NM Mining these...

  20. Uranium mining in Australia

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    The mining of uranium in Australia is criticised in relation to it's environmental impact, economics and effects on mine workers and Aborigines. A brief report is given on each of the operating and proposed uranium mines in Australia

  1. Digital preservation for heritages

    CERN Document Server

    Lu, Dongming

    2011-01-01

    ""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci

  2. Indiana Pavement Preservation Program

    OpenAIRE

    Ong, Ghim Ping (Raymond); Nantung, Tommy E.; Sinha, Kumares C.

    2010-01-01

    State highway agencies are facing immense pressure to maintain roads at acceptable levels amidst the challenging financial and economic situations. In recent years, pavement preservation has been sought as a potential alternative for managing the pavement assets, believing that it would provide a cost-effective solution in maintaining infrastructural conditions and meeting user expectations. This study explores the potential of pavement preservation concepts in managing the agency‘s pavement ...

  3. Mining royalties

    Directory of Open Access Journals (Sweden)

    Jelenković Rade J.

    2014-01-01

    Full Text Available Mineral resources are finite and nonrenewable in the sense that their extraction permanently depletes a country's resource inventory. The role of governments should be to manage the exploitation of these resources to maximize the economic benefits to their community, consistent with the need to attract and retain the exploration and development capital necessary to continue to realize these benefits for as long as possible. In designing mineral sector taxation systems, policy makers must carefully seek to balance tax types, rates, and incentives that satisfy the needs of both the nation and the mining investor.

  4. Privacy-preserving distributed mining of association rules using ...

    Indian Academy of Sciences (India)

    Harendra Chahar

    2017-11-17

    Nov 17, 2017 ... cally or vice-versa. For market analysis, business organizations would like to ..... ticipating sites using Elliptic-curve-based digital signature algorithm. ..... nication Technologies, Research, Innovation, and Vision for the Future ...

  5. A research for environmental problems in the vicinity of mining area. Investigation into the impact of metallic mining on the environment and solutions

    Energy Technology Data Exchange (ETDEWEB)

    Min, Jeong Sik; Cheong, Young Wook; Lee, Hyun Joo; Song, Duk Young [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    This study is focused on the impacts of metalliferous mines on the environment in the vicinity of the abandoned and active mines and establishment of abatements of mining environmental problems. Total number of metalliferous mines surveyed were 40 in which samples of waters, mine wastes and soil were taken. Water parameters such as the pH, Eh, TDS, conductivity, turbidity, dissolved oxygen and temperature were measured in the field. Elements such as As, Cd, Pb, Zn, Cu, Al, Mn, sulfate and cyanide were analyzed. Significant concentrations of heavy metals, mainly Cd, Zn, Cu, Fe, Mn and Al, were found in mine waters from adit and in leachates extracted from mine wastes. The mine waters flowing out from the Dalsung and Ilgwang mines were the typical acid mine drainage(AMD) contaminated by the heavy metals. Passive biological systems(Anoxic wetland) to treat AMD for metals were designed and monitored for effluents from the reactors with 4 types of composts, cow manure and limestones, Results showed that the mushroom compost with cow manure and limestone was the best substrates in metal removing efficiencies. Results from leaching of mine wastes showed that As, Cd and Cu were extracted from some of mine wastes. AMD from the mine waste dump of the Daduk mine was found. These mean that mine wastes can contaminate the soil, surface water and ground waters in vicinity of mines. Therefore cover systems or liner system for containments of mine wastes were suggested to preserve the environment. Cu and As concentrations in soils surveyed were below the heavy metal concentrations in soils of Korean standard preventing plant of the crops. However, most of the acid mine waters are drained untreated, and mine wastes with heavy metals are distributed near soil environment. Therefore efforts to reduce possibilities of soil contamination in the vicinity of mining areas is required. (author). 33 refs.

  6. Training for Preservation Management

    Directory of Open Access Journals (Sweden)

    Mirjam M. Foot

    1999-05-01

    Full Text Available In August 1997 the first of a series of summer schools in Preservation Management was held at the Archivschule in Marburg (Germany. The school was organised by the ECPA, the LIBER Division on Preservation, ICA and the Archivschule itself and was aimed at archivists and librarians in management positions from European institutions. It dealt with managerial, organisational and financial aspects of preservation and required active participation by those attending. Apart from introductory sessions by the teaching staff at the Archivschule, a large part of the course took the form of working groups, discussions, assignments and role play, to which participants were expected to take their own experience and problems. The school was conducted in German. Topics, spread over five days, ranged from preservation in the context of the core activities of libraries and archives; planning of preservation projects; general management issues, such as resource management, budgeting, priority setting, communication and effecting change; to more detailed considerations of day-to-day issues, such as storage, disaster control, microfilming and digitising, mass conservation processes, and moulds and fungi.

  7. Cancer and fertility preservation

    DEFF Research Database (Denmark)

    Lambertini, Matteo; Del Mastro, Lucia; Pescio, Maria C

    2016-01-01

    In the last years, thanks to the improvement in the prognosis of cancer patients, a growing attention has been given to the fertility issues. International guidelines on fertility preservation in cancer patients recommend that physicians discuss, as early as possible, with all patients...... of reproductive age their risk of infertility from the disease and/or treatment and their interest in having children after cancer, and help with informed fertility preservation decisions. As recommended by the American Society of Clinical Oncology and the European Society for Medical Oncology, sperm...... data have become available, and several issues in this field are still controversial and should be addressed by both patients and their treating physicians.In April 2015, physicians with expertise in the field of fertility preservation in cancer patients from several European countries were invited...

  8. Optimization of preservation activities and preservation engineering (2)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the viewpoint and the approach of the optimization of the ex post facto preservation and the content to be possessed in 'preservation engineering' are described. The optimization of the ex post facto preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  9. Uranium mining

    International Nuclear Information System (INIS)

    Cheeseman, E.W.

    1980-01-01

    The international uranium market appears to be currently over-supplied with a resultant softening in prices. Buyers on the international market are unhappy about some of the restrictions placed on sales by the government, and Canadian sales may suffer as a result. About 64 percent of Canada's shipments come from five operating Ontario mines, with the balance from Saskatchewan. Several other properties will be producing within the next few years. In spite of the adverse effects of the Three Mile Island incident and the default by the T.V.A. of their contract, some 3 600 tonnes of new uranium sales were completed during the year. The price for uranium had stabilized at US $42 - $44 by mid 1979, but by early 1980 had softened somewhat. The year 1979 saw the completion of major environmental hearings in Ontario and Newfoundland and the start of the B.C. inquiry. Two more hearings are scheduled for Saskatchewan in 1980. The Elliot Lake uranium mining expansion hearings are reviewed, as are other recent hearings. In the production of uranium for nuclear fuel cycle, environmental matters are of major concern to the industry, the public and to governments. Research is being conducted to determine the most effective method for removing radium from tailings area effluents. Very stringent criteria are being drawn up by the regulatory agencies that must be met by the industry in order to obtain an operating licence from the AECB. These criteria cover seepages from the tailings basin and through the tailings retention dam, seismic stability, and both short and long term management of the tailings waste management area. (auth)

  10. Advanced Digital Preservation

    CERN Document Server

    Giaretta, David

    2011-01-01

    There is growing recognition of the need to address the fragility of digital information, on which our society heavily depends for smooth operation in all aspects of daily life. This has been discussed in many books and articles on digital preservation, so why is there a need for yet one more? Because, for the most part, those other publications focus on documents, images and webpages -- objects that are normally rendered to be simply displayed by software to a human viewer. Yet there are clearly many more types of digital objects that may need to be preserved, such as databases, scientific da

  11. Kiruna research mine

    Energy Technology Data Exchange (ETDEWEB)

    Oestensen, A

    1983-12-01

    The research mine at Kiruna is the first large-scale mining research project sponsored by the Swedish government. Under the leadership of the Swedish Mining Research Foundation, a five-year project involving development of new mining systems and machinery will be carried out in cooperation with the Lulea Institute of Technology and a number of Swedish industrial companies.

  12. Application for trackless mining technique in Benxi uranium mine

    International Nuclear Information System (INIS)

    Chen Bingguo

    1998-01-01

    The author narrates the circumstances achieving constructional target in Benxi Uranium Mine under relying on advance of science and technology and adopting small trackless mining equipment, presents the application of trackless mining equipment at mining small mine and complex mineral deposit and discusses the unique superiority of trackless mining technique in development work, mining preparation work and backstoping

  13. Integral-preserving integrators

    International Nuclear Information System (INIS)

    McLaren, D I; Quispel, G R W

    2004-01-01

    Ordinary differential equations having a first integral may be solved numerically using one of several methods, with the integral preserved to machine accuracy. One such method is the discrete gradient method. It is shown here that the order of the method can be bootstrapped repeatedly to higher orders of accuracy. The method is illustrated using the Henon-Heiles system. (letter to the editor)

  14. Foodstuffs preservation by ionization

    International Nuclear Information System (INIS)

    1991-12-01

    This document contains all the papers presented at the meeting on foodstuffs preservation by ionization. These papers deal especially with the food ionization process, its development and the view of the food industry on ionization. Refs and figs (F.M.)

  15. Preserving food with radiation

    International Nuclear Information System (INIS)

    Thomas, A.C

    1978-01-01

    Food irradiation is becoming an increasingly more important method of food preservataion. The irradiation process and its advangages are briefly described, and its use in the preservation of poultry and various kinds of fruits is discussed. Fruit export is hampered by restrictions due to infestation. Radiation disinfestation will therefore be of great advantage and may lead to a growth in export markets

  16. Preserve America News

    Science.gov (United States)

    phone number. Whether or not you're able to let us know ahead of time, however, we hope you can join us Amache Preservation Society in Colorado and the Friends of Mount Hope Cemetery in New York. This brings Places: Breathing New Life into Our Communities." Read about this informative session. National

  17. POLARISATION PRESERVING OPTICAL FIBRE

    DEFF Research Database (Denmark)

    2000-01-01

    . This cladding structure provides polarisation preserving properties to the optical fibre. Optical fibres using this technology may have claddings with elements placed non-periodically as well as in a two-dimensional periodic lattice - such as cladding providing Photonic Band Gap (PBG) effects....

  18. Wood preservative testing

    Science.gov (United States)

    Rebecca Ibach; Stan T. Lebow

    2012-01-01

    Most wood species used in commercial and residential construction have little natural biological durability and will suffer from biodeterioration when exposed to moisture. Historically, this problem has been overcome by treating wood for outdoor use with toxic wood preservatives. As societal acceptance of chemical use changes, there is continual pressure to develop and...

  19. Preservation in New Buildings

    Directory of Open Access Journals (Sweden)

    Christopher Kitching

    2000-06-01

    Full Text Available In the United Kingdom (as in many other countries increasing attention is being paid to the importance of each library and archive having a written preservation strategy endorsed by its governing body. So increasingly we are asking: where does „preservation“ begin and what are its top priorities? Some would say preservation begins with the definition of collecting policies to ensure that only relevant items are acquired in the first place, and therefore that no unnecessary costs are incurred on the long-term care of unwanted and unconsulted items. Others might argue that the first priority must be the careful appraisal of existing holdings to determine their preservation and conservation requirements and to prioritise their treatment. Or should preservation begin with damage-limitation: restricting the physical handling of books and documents, on the one hand by providing whenever possible surrogate copies in digital formats or microform, and on the other hand by offering at least basic protection through appropriate boxing and packaging? This, surely, goes hand-in-hand with the education of staff and readers about the importance of treating rare or unique materials with proper respect.

  20. Preserving the Seminar Experience

    Science.gov (United States)

    Ramsey, David; Evans, Jocelyn; Levy, Meyer

    2016-01-01

    This article presents a new approach to online graduate education. With hopes of recruiting a larger cohort in order to preserve a graduate program struggling with low enrollment, we began offering a limited number of seats to students who would attend class in real time but from remote locations, using a videoconferencing platform. Unlike…

  1. DNA preservation in silk.

    Science.gov (United States)

    Liu, Yawen; Zheng, Zhaozhu; Gong, He; Liu, Meng; Guo, Shaozhe; Li, Gang; Wang, Xiaoqin; Kaplan, David L

    2017-06-27

    The structure of DNA is susceptible to alterations at high temperature and on changing pH, irradiation and exposure to DNase. Options to protect and preserve DNA during storage are important for applications in genetic diagnosis, identity authentication, drug development and bioresearch. In the present study, the stability of total DNA purified from human dermal fibroblast cells, as well as that of plasmid DNA, was studied in silk protein materials. The DNA/silk mixtures were stabilized on filter paper (silk/DNA + filter) or filter paper pre-coated with silk and treated with methanol (silk/DNA + PT-filter) as a route to practical utility. After air-drying and water extraction, 50-70% of the DNA and silk could be retrieved and showed a single band on electrophoretic gels. 6% silk/DNA + PT-filter samples provided improved stability in comparison with 3% silk/DNA + filter samples and DNA + filter samples for DNA preservation, with ∼40% of the band intensity remaining at 37 °C after 40 days and ∼10% after exposure to UV light for 10 hours. Quantitative analysis using the PicoGreen assay confirmed the results. The use of Tris/borate/EDTA (TBE) buffer enhanced the preservation and/or extraction of the DNA. The DNA extracted after storage maintained integrity and function based on serving as a functional template for PCR amplification of the gene for zinc finger protein 750 (ZNF750) and for transgene expression of red fluorescence protein (dsRed) in HEK293 cells. The high molecular weight and high content of a crystalline beta-sheet structure formed on the coated surfaces likely accounted for the preservation effects observed for the silk/DNA + PT-filter samples. Although similar preservation effects were also obtained for lyophilized silk/DNA samples, the rapid and simple processing available with the silk-DNA-filter membrane system makes it appealing for future applications.

  2. Opencast mining - financial management

    Energy Technology Data Exchange (ETDEWEB)

    Cotgrove, P.G.

    Over the past two years, 28 contracts to work opencast sites in Great Britain have been placed, valued in total at over 400m pounds. The value of individual contracts ranges up to 290m pounds. Opencast's contribution to the coal industry is highly significant, not simply in that over the past ten years it has generated operating profits in excess of 1.7 billion pounds and cash of over 1.5 billion pounds, but in the fact that it complements the deep mining leg of the British Coal Corporation in many ways. The quality and handleability of opencast coals has sweetened blends and thus retained markets and improved realisations, discarded fines and slurries which would otherwise be unsaleable have been imported to opencast plants and blended in with a better product. Derelict colliery sites have been cleared, worked, reclaimed and made available for agriculture or leisure, and perhaps most important of all, the excavation of shallow seams which would be inaccessible from underground is helping to preserve deeper reserves until scarcity increases energy prices to the point where they will become a viable, indeed attractive, investment. 4 tabs.

  3. Mining with communities

    International Nuclear Information System (INIS)

    Veiga, Marcello M.; Scoble, Malcolm; McAllister, Mary Louise

    2001-01-01

    To be considered as sustainable, a mining community needs to adhere to the principles of ecological sustainability, economic vitality and social equity. These principles apply over a long time span, covering both the life of the mine and post-mining closure. The legacy left by a mine to the community after its closure is emerging as a significant aspect of its planning. Progress towards sustainability is made when value is added to a community with respect to these principles by the mining operation during its life cycle. This article presents a series of cases to demonstrate the diverse potential challenges to achieving a sustainable mining community. These case studies of both new and old mining communities are drawn mainly from Canada and from locations abroad where Canadian companies are now building mines. The article concludes by considering various approaches that can foster sustainable mining communities and the role of community consultation and capacity building. (author)

  4. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Oztasiran, I.

    1984-01-01

    Irradiation is a physical process for treating food and as such it is comparable to other processing techniques such as heating or freezing foods for preservation. The energy level used in food irradiation is always below that producing radioactivity in the treated food, hence this aspect can be totally excluded in wholesomeness evaluations. Water is readily ionized and may be the primary source of ionization in foods with secondary effects on other molecules, possibly more a result of water ionization than of direct hits. In the presence of oxygen, highly reactive compounds may be produced, such as H, H 3 0+ and H 2 O 2 . Radiation at the energy flux levels used for food (<2 MeV) does not induce radioactivity. Food irradiation applications are already technically and economically feasible and that food so treated is suitable for consumption. Food irradiation techniques can play an important role for an improved preservation, storage and distribution of food products. (author)

  5. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Kooij, J. van

    1981-01-01

    Twenty-five years of development work on the preservation of food by irradiation have shown that this technology has the potential to reduce post-harvest losses and to produce safe foods. The technological feasibility has been established but general acceptance of food irradiation by national regulatory bodies and consumers requires attention. The positive aspects of food preservation by irradiation include: the food keeps its freshness and its physical state, agents which cause spoilage (bacteria, etc.) are eliminated, recontamination does not take place, provided packaging materials are impermeable to bacteria and insects. It inhibits sprouting of root crops, kills insects and parasites, inactivates bacteria, spores and moulds, delays ripening of fruit, improves the technological properties of food. It makes foods biologically safe, allows the production of shelf-stable foods and is excellent for quarantine treatment, and generally improves food hygiene. The dose ranges needed for effective treatment are given

  6. How to preserve foods

    International Nuclear Information System (INIS)

    Balek, V.; Vadassova, J.

    1979-01-01

    The use of gamma and fast electron radiations for food preservation is described. Examples are given of the application of ionizing radiation for retarding potato germination, onion growth, and fruit ripening, for limiting the action of microorganisms, and removing salmonella from meat products. The method has remarkable prospects although it may not be considered to be a general-purpose method. Geographic and economic conditions should always be taken into consideration. (J.P.)

  7. Preservation and gamma irradiation

    International Nuclear Information System (INIS)

    Ramiere, R.

    1991-01-01

    The paper reviews briefly the application of gamma radiation to preservation of cultural objects for disinsectization, disinfection and strengthening of materials such as wood or stone by impregnation with a liquid resin and in situ polymerization. As heavy equipment is required two facilities are specialized a 1000 T Bq cobalt 60 source at Grenoble (France) and 100 T Bq one at Rostoky (Czechoslovakia). Examples of treated objects are given [fr

  8. Beneficial bread without preservatives

    OpenAIRE

    Denkova, Zapryana; Denkova, Rositsa

    2014-01-01

    Besides their inherent nutritional value functional foods contain substances that have beneficial impact on the functioning of organs and systems in the human body and reduce the risk of disease. Bread and bakery goods are basic foods in the diet of contemporary people. Preservatives are added to the composition of foods in order to ensure their microbiological safety, but these substances affect directly the balance of microflora in the tract. A great problem is mold and bacterial spoilage (...

  9. South African mine valuation

    Energy Technology Data Exchange (ETDEWEB)

    Storrar, C D

    1977-01-01

    This article sets out the basic concepts of mine valuation, with gold mining receiving more space than base minerals and coal. Sampling practice is given special attention. Chapter headings are methods of investigation, sampling, underground sampling, averaging of underground sampling, diamond-drill sampling, mass and mineral content of ore, organization of a sample office, working costs, mining pay limits, ore reserves, ore accounting, maintenance of grade, forecasting operations and life of mine, statistical mine valuation, state's share of profits and taxation, and financial valuation of mining ventures.

  10. Technological highwall mining

    Energy Technology Data Exchange (ETDEWEB)

    Davison, I. [Highwall Systems (United States)

    2006-09-15

    The paper explores the issues facing highwall mining. Based in Chilhowie, Virginia, American Highwall Systems has developed a highwall mining system that will allow the mining of coal seams from 26 in to 10 ft in thickness. The first production model, AH51, began mining in August 2006. Technologies incorporated into the company's mining machines to improve the performance, enhance the efficiency, and improve the reliability of the highwall mining equipment incorporate technologies from many disciplines. Technology as applied to design engineering, manufacturing and fabrication engineering, control and monitoring computer hardware and software has played an important role in the evolution of the American Highwall Systems design concept. 5 photos.

  11. Fertility preservation 2

    Science.gov (United States)

    De Vos, Michel; Smitz, Johan; Woodruff, Teresa K

    2014-01-01

    Enhanced long-term survival rates of young women with cancer and advances in reproductive medicine and cryobiology have culminated in an increased interest in fertility preservation methods in girls and young women with cancer. Present data suggest that young patients with cancer should be referred for fertility preservation counselling quickly to help with their coping process. Although the clinical application of novel developments, including oocyte vitrification and oocyte maturation in vitro, has resulted in reasonable success rates in assisted reproduction programmes, experience with these techniques in the setting of fertility preservation is in its infancy. It is hoped that these and other approaches, some of which are still regarded as experimental (eg, ovarian tissue cryopreservation, pharmacological protection against gonadotoxic agents, in-vitro follicle growth, and follicle transplantation) will be optimised and become established within the next decade. Unravelling the complex mechanisms of activation and suppression of follicle growth will not only expand the care of thousands of women diagnosed with cancer, but also inform the care of millions of women confronted with reduced reproductive fitness because of ageing. PMID:25283571

  12. Grain preservation in SSSR

    International Nuclear Information System (INIS)

    Trisviatski, L.A.

    1973-01-01

    First the importance of cereals collected in the S.S.S.R., the reason why the government had to put in practice a storage chain, composed of large capacity store houses (200 000 metric tonnes, or more) is reminded. When climatic conditions result in wet harvested grains, cereals are dried either in state enterprise dryers (32 to 50 tonnes/hour) or in kolkhozes' dryers (2 to 16 tonnes/hour). A new type of drying with recycling, has been developped, economizing 10 to 15 p. 100. Then the possibilities offered by the technique of partial drying of very wet grains are studied and the preservation processes using fresh ventilation, or hot ventilation with drying effect are described. The question of silage of wet grains destined to animal consumption is then examined as well as preservation by sodium pyrosulfide; the use of propionic acid, little developped in SSSR, is studied now, just as storage with inert gas. The struggle technics against insects, either with chemical agents, or with irradiation are described. Finally the modalities of technicians formation, specialized in preservation, are discussed [fr

  13. Spatio-Temporal Data Mining for Location-Based Services

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo

    . The objectives of the presented thesis are three-fold. First, to extend popular data mining methods to the spatio-temporal domain. Second, to demonstrate the usefulness of the extended methods and the derived knowledge in promising LBS examples. Finally, to eliminate privacy concerns in connection with spatio......-temporal data mining by devising systems for privacy-preserving location data collection and mining.......Location-Based Services (LBS) are continuously gaining popularity. Innovative LBSes integrate knowledge about the users into the service. Such knowledge can be derived by analyzing the location data of users. Such data contain two unique dimensions, space and time, which need to be analyzed...

  14. Healthcare information systems: data mining methods in the creation of a clinical recommender system

    Science.gov (United States)

    Duan, L.; Street, W. N.; Xu, E.

    2011-05-01

    Recommender systems have been extensively studied to present items, such as movies, music and books that are likely of interest to the user. Researchers have indicated that integrated medical information systems are becoming an essential part of the modern healthcare systems. Such systems have evolved to an integrated enterprise-wide system. In particular, such systems are considered as a type of enterprise information systems or ERP system addressing healthcare industry sector needs. As part of efforts, nursing care plan recommender systems can provide clinical decision support, nursing education, clinical quality control, and serve as a complement to existing practice guidelines. We propose to use correlations among nursing diagnoses, outcomes and interventions to create a recommender system for constructing nursing care plans. In the current study, we used nursing diagnosis data to develop the methodology. Our system utilises a prefix-tree structure common in itemset mining to construct a ranked list of suggested care plan items based on previously-entered items. Unlike common commercial systems, our system makes sequential recommendations based on user interaction, modifying a ranked list of suggested items at each step in care plan construction. We rank items based on traditional association-rule measures such as support and confidence, as well as a novel measure that anticipates which selections might improve the quality of future rankings. Since the multi-step nature of our recommendations presents problems for traditional evaluation measures, we also present a new evaluation method based on average ranking position and use it to test the effectiveness of different recommendation strategies.

  15. Contract Mining versus Owner Mining – The Way Forward | Suglo ...

    African Journals Online (AJOL)

    Ghana Mining Journal ... By contracting out one or more of their mining operations, the mining companies can concentrate on their core businesses. This paper reviews ... The general trends in the mining industry show that contract mining will be the way forward for most mines under various circumstances in the future.

  16. Optimization of mining design of Hongwei uranium mine

    International Nuclear Information System (INIS)

    Wu Sanmao; Yuan Baixiang

    2012-01-01

    Combined with the mining conditions of Hongwei uranium mine, optimization schemes for hoisting cage, mine drainge,ore transport, mine wastewater treatment, power-supply system,etc are put forward in the mining design of the mine. Optimized effects are analyzed from the aspects of technique, economy, and energy saving and reducing emissions. (authors)

  17. Training development for pavement preservation.

    Science.gov (United States)

    2013-05-01

    This research project strives to help the Iowa Department of Transportation (DOT) fully achieve the full benefits of pavement : preservation through training on proper selection, design, and application of pavement preservation treatments. In some ca...

  18. ACHP | Tribal Historic Preservation Officers

    Science.gov (United States)

    preservation of significant historic properties. Those functions include identifying and maintaining Working with Section 106 Federal, State, & Tribal Programs Training & Education Publications Search skip specific nav links Home arrow Historic Preservation Programs & Officers arrow THPOs

  19. Uranium mining in Australia

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    Known uranium deposits and the companies involved in uranium mining and exploration in Australia are listed. The status of the development of the deposits is outlined and reasons for delays to mining are given

  20. Mines and Mineral Resources

    Data.gov (United States)

    Department of Homeland Security — Mines in the United States According to the Homeland Security Infrastructure Program Tiger Team Report Table E-2.V.1 Sub-Layer Geographic Names, a mine is defined as...

  1. Preservative treatments for building components

    Science.gov (United States)

    Stan Lebow

    2007-01-01

    The wood species most commonly used in construction have little natural durability Thus, they are treated with preservatives when used in conditions that favor biodeterioration. The type of preservative used varies with the type of wood product, exposure condition, and specific agent of deterioration. This paper discusses the characteristics of several preservative...

  2. Uranium mine ventilation

    International Nuclear Information System (INIS)

    Katam, K.; Sudarsono

    1982-01-01

    Uranium mine ventilation system aimed basically to control and decreasing the air radioactivity in mine caused by the radon emanating from uranium ore. The control and decreasing the air ''age'' in mine, with adding the air consumption volume, increasing the air rate consumption, closing the mine-out area; using closed drainage system. Air consumption should be 60m 3 /minute for each 9m 2 uranium ore surfaces with ventilation rate of 15m/minute. (author)

  3. MONITORING OF MINING

    Directory of Open Access Journals (Sweden)

    Berislav Šebečić

    1996-12-01

    Full Text Available The way mining was monitored in the past depended on knowledge, interest and the existing legal regulations. Documentary evidence about this work can be found in archives, libraries and museums. In particular, there is the rich archival material (papers and books concerning the work of the one-time Imperial and Royal Mining Captaincies in Zagreb, Zadar, Klagenfurt and Split, A minor part of the documentation has not yet been transferred to Croatia. From mining handbooks and books we can also find out about mining in Croatia. In the context of Austro-Hungary. For example, we can find out that the first governorships in Zagreb and Zadar headed the Ban, Count Jelacic and Baron Mamula were also the top mining authorities, though this, probably from political motives, was suppressed in the guides and inventories or the Mining Captaincies. At the end of the 1850s, Croatia produced 92-94% of sea salt, up to 8.5% of sulphur, 19.5% of asphalt and 100% of oil for the Austro-Hungarian empire. From data about mining in the Split Mining Captaincy, prepared for the Philadephia Exhibition, it can be seen that in the exploratory mining operations in which there were 33,372 independent mines declared in 1925 they were looking mainly for bauxite (60,0%, then dark coal (19,0%, asphalts (10.3% and lignites (62%. In 1931, within the area covered by the same captaincy, of 74 declared mines, only 9 were working. There were five coal mines, three bauxite mines and one for asphalt. I suggest that within state institution, the Mining Captaincy or Authority be renewed, or that a Mining and Geological Authority be set ap, which would lead to the more complete affirmation of Croatian mining (the paper is published in Croatian.

  4. Mine drainage treatment

    OpenAIRE

    Golomeova, Mirjana; Zendelska, Afrodita; Krstev, Boris; Golomeov, Blagoj; Krstev, Aleksandar

    2012-01-01

    Water flowing from underground and surface mines and contains high concentrations of dissolved metals is called mine drainage. Mine drainage can be categorized into several basic types by their alkalinity or acidity. Sulfide rich and carbonate poor materials are expected to produce acidic drainage, and alkaline rich materials, even with significant sulfide concentrations, often produce net alkaline water. Mine drainages are dangerous because pollutants may decompose in the environment. In...

  5. Mining in El Salvador

    DEFF Research Database (Denmark)

    Pacheco Cueva, Vladimir

    2014-01-01

    In this guest article, Vladimir Pacheco, a social scientist who has worked on mining and human rights shares his perspectives on a current campaign against mining in El Salvador – Central America’s smallest but most densely populated country.......In this guest article, Vladimir Pacheco, a social scientist who has worked on mining and human rights shares his perspectives on a current campaign against mining in El Salvador – Central America’s smallest but most densely populated country....

  6. GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    R. Praveena Priyadarsini

    2011-04-01

    Full Text Available Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-diversity and t-closeness and data perturbation. In this paper k-anonymity privacy protection technique is applied to high dimensional datasets like adult and census. since, both the data sets are high dimensional, feature subset selection method like Gain Ratio is applied and the attributes of the datasets are ranked and low ranking attributes are filtered to form new reduced data subsets. K-anonymization privacy preservation technique is then applied on reduced datasets. The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively. Experimental results show that classification and clustering accuracy are comparatively the same for reduced k-anonym zed datasets and the original data sets.

  7. Preserving the Manhattan Project

    Science.gov (United States)

    Kelly, Cynthia

    2014-03-01

    When future generations look back on the 20th century, few events will rival the harnessing of nuclear energy as a turning point in world history, science and society. Yet, the Department of Energy has not always embraced its Manhattan Project origins. The presentation will focus on the progress made over the last 20 years to preserve the properties and first-hand accounts that for decades have been threatened with demolition and indifference. Since the mid-1950s, most remaining Manhattan Project properties at the Los Alamos National Laboratory had been abandoned. Among them was a cluster of wooden buildings called the ``V Site.'' This is where scientists assembled the ``Gadget,'' the world's first atomic device tested on July 16, 1945. Regardless of its significance, the ``V Site'' buildings like all the rest were slated for demolition. The Advisory Council on Historic Preservation (ACHP) toured the properties in November 1998. Most could not believe that the world's first atomic bomb was designed in such humble structures. The properties were declared to be ``monumental in their lack of monumentality.'' A Save America's Treasures grant for 700,000 was awarded to restore the properties. To raise the required matching funds, I left the Federal government and soon founded the Atomic Heritage Foundation. The presentation will trace the progress made over the last decade to generate interest and support nationwide to preserve the Manhattan Project heritage. Saving both the physical properties and first-hand accounts of the men and women have been a priority. Perhaps our most significant achievement may be legislation now under consideration by Congress to create a Manhattan Project National Historical Park. Seventy years later, the Manhattan Project is finally getting the recognition it deserves.

  8. Data Mining for CRM

    Science.gov (United States)

    Thearling, Kurt

    Data Mining technology allows marketing organizations to better understand their customers and respond to their needs. This chapter describes how Data Mining can be combined with customer relationship management to help drive improved interactions with customers. An example showing how to use Data Mining to drive customer acquisition activities is presented.

  9. Colombian mining legislation

    International Nuclear Information System (INIS)

    Mendoza Delgado, Eva Isolina

    2004-01-01

    The paper makes a historical recount of the mining legislation in Colombia, it is about the more relevant aspects of the Code of Mines, like they are the title miner, obligations, economic aspects, integration of mining areas and of the benefits contemplated in the law 685 of 2001

  10. Mine waste management

    International Nuclear Information System (INIS)

    Hutchinson, I.P.G.; Ellison, R.D.

    1992-01-01

    This book reports on mine waste management. Topics covered include: Performance review of modern mine waste management units; Mine waste management requirements; Prediction of acid generation potential; Attenuation of chemical constituents; Climatic considerations; Liner system design; Closure requirements; Heap leaching; Ground water monitoring; and Economic impact evaluation

  11. Mining compressing sequential problems

    NARCIS (Netherlands)

    Hoang, T.L.; Mörchen, F.; Fradkin, D.; Calders, T.G.K.

    2012-01-01

    Compression based pattern mining has been successfully applied to many data mining tasks. We propose an approach based on the minimum description length principle to extract sequential patterns that compress a database of sequences well. We show that mining compressing patterns is NP-Hard and

  12. Mined-out land

    International Nuclear Information System (INIS)

    Reinsalu, Enno; Toomik, Arvi; Valgma, Ingo

    2002-01-01

    Estonian mineral resources are deposited in low depth and mining fields are large, therefore vast areas are affected by mining. There are at least 800 deposits with total area of 6,000 km 2 and about the same number of underground mines, surface mines, peat fields, quarries, and sand and gravel pits. The deposits cover more than 10% of Estonian mainland. The total area of operating mine claims exceeds 150 km 2 that makes 0.3 % of Estonian area. The book is written mainly for the people who are living or acting in the area influenced by mining. The observations and research could benefit those who are interested in geography and environment, who follow formation and look of mined-out landscapes. The book contains also warnings for careless people on and under the surface of the mined-out land. Part of the book contains results of the research made in 1968-1993 by the first two authors working at the Estonian branch of A.Skochinsky Institute of Mining. Since 1990, Arvi Toomik continued this study at the Northeastern section of the Institute of Ecology of Tallinn Pedagogical University. Enno Reinsalu studied aftereffects of mining at the Mining Department of Tallinn Technical University from 1998 to 2000. Geographical Information System for Mining was studied by Ingo Valgma within his doctoral dissertation, and this book is one of the applications of his study

  13. Mine water treatment

    Energy Technology Data Exchange (ETDEWEB)

    Komissarov, S V

    1980-10-01

    This article discusses composition of chemical compounds dissolved or suspended in mine waters in various coal basins of the USSR: Moscow basin, Kuzbass, Pechora, Kizelovsk, Karaganda, Donetsk and Chelyabinsk basins. Percentage of suspended materials in water depending on water source (water from water drainage system of dust suppression system) is evaluated. Pollution of mine waters with oils and coli bacteria is also described. Recommendations on construction, capacity of water settling tanks, and methods of mine water treatment are presented. In mines where coal seams 2 m or thicker are mined a system of two settling tanks should be used: in the upper one large grains are settled, in the lower one finer grains. The upper tank should be large enough to store mine water discharged during one month, and the lower one to store water discharged over two months. Salty waters from coal mines mining thin coal seams should be treated in a system of water reservoirs from which water evaporates (if climatic conditions permit). Mine waters from mines with thin coal seams but without high salt content can be treated in a system of long channels with water plants, which increase amount of oxygen in treated water. System of biological treatment of waste waters from mine wash-houses and baths is also described. Influence of temperature, sunshine and season of the year on efficiency of mine water treatment is also assessed. (In Russian)

  14. Mountaintop mining consequences

    Science.gov (United States)

    M.A. Palmer; E.S. Bernhardt; W.H. Schlesinger; K.N. Eshleman; E. Foufoula-Georgiou; M.S. Hendryx; A.D. Lemly; G.E. Likens; O.L. Loucks; M.E. Power; P.S. White; P.R. Wilcock

    2010-01-01

    There has been a global, 30-year increase in surface mining (1), which is now the dominant driver of land-use change in the central Appalachian ecoregion of the United States (2). One major form of such mining, mountaintop mining with valley fills (MTM/VF) (3), is widespread throughout eastern Kentucky, West Virginia (WV), and southwestern Virginia. Upper elevation...

  15. Ghana Mining Journal: Contact

    African Journals Online (AJOL)

    Principal Contact. Professor Daniel Mireku-Gyimah Editor-in-Chief University of Mines & Technology Ghana Mining Journal University of Mines & Technology P. O. BOX 237 Tarkwa Ghana Phone: +233 362 20280/20324. Fax: +233 362 20306. Email: dm.gyimah@umat.edu.gh ...

  16. Fertility Preservation in Girls

    Directory of Open Access Journals (Sweden)

    Jennia Michaeli

    2012-01-01

    Full Text Available Children that undergo treatment for cancer are at risk of suffering from subfertility or hormonal dysfunction due to the detrimental effects of radiotherapy and chemotherapeutic agents on the gonads. Cryopreservation of ovarian tissue prior to treatment offers the possibility of restoring gonadal function after resumption of therapy. Effective counseling and management of pediatric patients is crucial for preserving their future reproductive potential. The purpose of this article is to review recent literature and to revise recommendations we made in a 2007 article. Pediatric hemato-oncology, reproductive endocrinology, surgery, anesthesia and bioethics perspectives are discussed and integrated to propose guidelines for offering ovarian cryopreservation to premenarcheal girls with cancer.

  17. Radiation preservation of spices

    International Nuclear Information System (INIS)

    Badshah, A.; Tasnim, A.; Khan, M.; Sattar, A.; Khan, I.

    1989-01-01

    The use of gamma irradiation for preservation of red hot pepper has been explained in report, as it can kill the harmful organisms without altering the organolpetic properties. The sample were dried and reduced to pass through 20 mesh. The samples were irradiated at different dose levels of 0, 2.5, 5.0, 7.5 and 10.0 KGy and results have been shown after different time intervals. Radiation and packaging treatments resulted normaly no effect on the color of dry fruits. (A.B)

  18. Preserving Transactional Data

    OpenAIRE

    Sara Day Thomson

    2017-01-01

    This paper is an adaptation of a longer report commissioned by the UK Data Service. The longer report contributes to on-going support for the Big Data Network – a programme funded by the Economic and Social Research Council (ESRC). The longer report can be found at doi:10.7207/twr16-02. This paper discusses requirements for preserving transactional data and the accompanying challenges facing the companies and institutions who aim to re-use these data for analysis or research. It present...

  19. Mutual preservation of entanglement

    International Nuclear Information System (INIS)

    Veitia, Andrzej; Jing, Jun; Yu, Ting; Wong, Chee Wei

    2012-01-01

    We study a generalized double Jaynes–Cummings (JC) model where two entangled pairs of two-level atoms interact indirectly. We show that there exist initial states of the qubit system so that two entangled pairs are available at all times. In particular, the minimum entanglement in the pairs as a function of the initial state is studied. Finally, we extend our findings to a model consisting of multi-mode atom–cavity interactions. We use a non-Markovian quantum state diffusion (QSD) equation to obtain the steady-state density matrix for the qubits. We show that the multi-mode model also displays dynamical preservation of entanglement. -- Highlights: ► Entanglement dynamics is studied in a generalized double Jaynes–Cummings model. ► We show that for certain initial states, the atoms remain entangled at all times. ► We extend the results to the case of multi-mode atom–cavity interactions. ► The model suggest that indirect interaction may help to preserve entanglement.

  20. Mining Act 1968-1983 with regulations and an index (compiled to 1 January, 1984)

    Energy Technology Data Exchange (ETDEWEB)

    1984-01-01

    This consolidation of the Queensland Mining Act covers the Mining Act 1968 - 1983, Mining Act Amendment Act 1971 (No.2) No.82: Mining Act Amendment Act 1980, No.13: Mining Acts Amendment Act of 1929, 20 Geo. 5 of No.35: Regulations. The Act is arranged in 13 parts. Part I. Preliminary; II. Meaning of Terms; III. Mining districts and mining fields; IV. Authorities conferring rights to mine and prospect - Division I. Miner's right; IA. Mining claim; II. Authority to prospect; III. Mining Lease; IV. Compensation for damage caused by mining on Crown land; V. Caveats: Part V. Mining on reserves, residence areas and business areas; Part VI. Constructions and carriage through, over, or under alien land; VII. Sludge abatement; VIII. Royalties; IX. Administration - Division I. Appointment of officers; II. Wardens courts; III. Special powers of wardens and wardens courts; IV. Appeals from wardens courts: Part X. General Provisions; XI. Regulations; XII. Mining on private land; XIII. Rights independent of this Act preserved: Schedule.

  1. Mining planing introduction

    International Nuclear Information System (INIS)

    Toledo, R.D.

    1985-01-01

    Basic concepts concerning mining parameters, plan establishment and typical procedure methods applied throughout the physical execution of mining operations are here determined, analyzed and discussed. Technological and economic aspects of the exploration phase are presented as well as general mathematical and statistical methods for estimating, analyzing and representing mineral deposits which are virtually essential for good mining project execution. The characterization of important mineral substances and the basic parameters of mining works are emphasized in conjunction with long, medium and short term mining planning. Finally, geological modelling, ore reserves calculations and final economic evaluations are considered using a hypothetical example in order to consolidate the main elaborated ideas. (D.J.M.) [pt

  2. Gold-Mining

    DEFF Research Database (Denmark)

    Raaballe, J.; Grundy, B.D.

    2002-01-01

      Based on standard option pricing arguments and assumptions (including no convenience yield and sustainable property rights), we will not observe operating gold mines. We find that asymmetric information on the reserves in the gold mine is a necessary and sufficient condition for the existence...... of operating gold mines. Asymmetric information on the reserves in the mine implies that, at a high enough price of gold, the manager of high type finds the extraction value of the company to be higher than the current market value of the non-operating gold mine. Due to this under valuation the maxim of market...

  3. Improving safety in mining

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-08-15

    AcuMine is a spin-out company from CRC Mining Australia and the University of Sydney's Australian Centre for Field Robotics (ACFR). Its focus is to provide safety and fatigue management in mining environments. The AcuLine Haul Check system was its first development. Of greater benefit to safety in mines will be the AcuMine Proximity System (APPS) developed to reliably detect and warn drivers when in proximity to other trucks and utility vehicles and to detect personnel near to those heavy vehicles. 6 figs.

  4. Data mining in radiology

    International Nuclear Information System (INIS)

    Kharat, Amit T; Singh, Amarjit; Kulkarni, Vilas M; Shah, Digish

    2014-01-01

    Data mining facilitates the study of radiology data in various dimensions. It converts large patient image and text datasets into useful information that helps in improving patient care and provides informative reports. Data mining technology analyzes data within the Radiology Information System and Hospital Information System using specialized software which assesses relationships and agreement in available information. By using similar data analysis tools, radiologists can make informed decisions and predict the future outcome of a particular imaging finding. Data, information and knowledge are the components of data mining. Classes, Clusters, Associations, Sequential patterns, Classification, Prediction and Decision tree are the various types of data mining. Data mining has the potential to make delivery of health care affordable and ensure that the best imaging practices are followed. It is a tool for academic research. Data mining is considered to be ethically neutral, however concerns regarding privacy and legality exists which need to be addressed to ensure success of data mining

  5. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  6. Preserving reptiles for research

    Science.gov (United States)

    Gotte, Steve W.; Jacobs, Jeremy F.; Zug, George R.; Dodd, C. Kenneth

    2016-01-01

    What are voucher specimens and why do we collect them? Voucher specimens are animals and/or their parts that are deposited in a research museum to document the occurrence of a taxon at a specific location in space and time (Pleijel et al., 2008; Reynolds and McDiarmid, 2012). For field biologists, vouchers are the repeatable element of a field study as they allow other biologists, now and in the future, to confirm the identity of species that were studied. The scientific importance of a voucher specimen or series of specimens is that other people are afforded the opportunity to examine the entire animal and confirm or correct identifications. A photographic record is somewhat useful for recording the occurrence of a species, but such records can be insufficient for reliable confirmation of specific identity. Even if a photo shows diagnostic characters of currently recognized taxa, it may not show characters that separate taxa that may be described in the future. Substantial cryptic biodiversity is being found in even relatively well-known herpetofaunas (Crawford et al., 2010), and specimens allow researchers to retroactively evaluate the true diversity in a study as understanding of taxonomy evolves. They enable biologists to study the systematic relationships of populations by quantifying variation in different traits. Specimens are also a source of biological data such as behaviour, ecology, epidemiology, and reproduction through examination of their anatomy, reproductive and digestive tracts, and parasites (Suarez and Tsutsui, 2004). Preserving reptiles as vouchers is not difficult, although doing it properly requires care, effort, and time. Poorly preserved vouchers can invalidate the results and conclusions of your study because of the inability to confirm the identity of your study animals. Good science requires repeatability of observations, and the absence of vouchers or poorly preserved ones prevents such confirmation. Due to space restrictions, we are

  7. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Gottschalk, M.

    1978-01-01

    In November, 1977, an International Symposium on Food Preservation by Irradiation was held at Wageningen, the Netherlands. About 200 participants attended the Symposium which was organised by the International Atomic Energy Agency, the Food and Agriculture Organization of the United Nations and the World Health Organization; a reflection of the active interest which is being shown in food irradiation processing, particularly among developing countries. The 75 papers presented provided an excellent review of the current status of food irradiation on a wide range of different topics, and the Symposium also afforded the valuable opportunity for informal discussion among the participants and for developing personal contacts. A brief survey of the salient aspects discussed during the course of the meeting are reported on. (orig.) [de

  8. Economics of mine water treatment

    OpenAIRE

    Dvořáček, Jaroslav; Vidlář, Jiří; Štěrba, Jiří; Heviánková, Silvie; Vaněk, Michal; Barták, Pavel

    2012-01-01

    Mine water poses a significant problem in lignite coal mining. The drainage of mine water is the fundamental prerequisite of mining operations. Under the legislation of the Czech Republic, mine water that discharges into surface watercourse is subject to the permission of the state administration body in the water management sector. The permission also stipulates the limits for mine water pollution. Therefore, mine water has to be purified prior to discharge. Although all...

  9. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Provider Pocket Guides Provider Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ... Patient Pocket Guides Patient Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ...

  10. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ...

  11. Geochemical Characteristics of TP3 Mine Wastes at the Elizabeth Copper Mine Superfund Site, Orange County, Vermont

    Science.gov (United States)

    Hammarstrom, Jane M.; Piatak, Nadine M.; Seal, Robert R.; Briggs, Paul H.; Meier, Allen L.; Muzik, Timothy L.

    2003-01-01

    Remediation of the Elizabeth mine Superfund site in the Vermont copper belt poses challenges for balancing environmental restoration goals with issues of historic preservation while adopting cost-effective strategies for site cleanup and long-term maintenance. The waste-rock pile known as TP3, at the headwaters of Copperas Brook, is especially noteworthy in this regard because it is the worst source of surface- and ground-water contamination identified to date, while also being the area of greatest historical significance. The U.S. Geological Survey (USGS) conducted a study of the historic mine-waste piles known as TP3 at the Elizabeth mine Superfund site near South Strafford, Orange County, VT. TP3 is a 12.3-acre (49,780 m2) subarea of the Elizabeth mine site. It is a focus area for historic preservation because it encompasses an early 19th century copperas works as well as waste from late 19th- and 20th century copper mining (Kierstead, 2001). Surface runoff and seeps from TP3 form the headwaters of Copperas Brook. The stream flows down a valley onto flotation tailings from 20th century copper mining operations and enters the West Branch of the Ompompanoosuc River approximately 1 kilometer downstream from the mine site. Shallow drinking water wells down gradient from TP3 exceed drinking water standards for copper and cadmium (Hathaway and others, 2001). The Elizabeth mine was listed as a Superfund site in 2001, mainly because of impacts of acid-mine drainage on the Ompompanoosuc River.

  12. Data mining, mining data : energy consumption modelling

    Energy Technology Data Exchange (ETDEWEB)

    Dessureault, S. [Arizona Univ., Tucson, AZ (United States)

    2007-09-15

    Most modern mining operations are accumulating large amounts of data on production and business processes. Data, however, provides value only if it can be translated into information that appropriate users can utilize. This paper emphasized that a new technological focus should emerge, notably how to concentrate data into information; analyze information sufficiently to become knowledge; and, act on that knowledge. Researchers at the Mining Information Systems and Operations Management (MISOM) laboratory at the University of Arizona have created a method to transform data into action. The data-to-action approach was exercised in the development of an energy consumption model (ECM), in partnership with a major US-based copper mining company, 2 software companies, and the MISOM laboratory. The approach begins by integrating several key data sources using data warehousing techniques, and increasing the existing level of integration and data cleaning. An online analytical processing (OLAP) cube was also created to investigate the data and identify a subset of several million records. Data mining algorithms were applied using the information that was isolated by the OLAP cube. The data mining results showed that traditional cost drivers of energy consumption are poor predictors. A comparison was made between traditional methods of predicting energy consumption and the prediction formed using data mining. Traditionally, in the mines for which data were available, monthly averages of tons and distance are used to predict diesel fuel consumption. However, this article showed that new information technology can be used to incorporate many more variables into the budgeting process, resulting in more accurate predictions. The ECM helped mine planners improve the prediction of energy use through more data integration, measure development, and workflow analysis. 5 refs., 11 figs.

  13. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  14. Responsible Development of Areva's Mining Activities - 2010 Report

    International Nuclear Information System (INIS)

    2011-07-01

    Areva's mining activities place it among the world leaders in uranium production. The main objective of Areva's mining activities is ensuring uranium supply over the long term to produce nuclear power while emitting less CO 2 , reducing risks to people and the environment and contributing to the development of areas where mining activities take place. Areva's mining activities span five continents. This diversified portfolio allows the group to carry out exploration, project development and production activities in various geopolitical and technological contexts with the support of its staff's multi-cultural backgrounds. This document is the first Responsible Development report of Areva's Mining Activities. Content: 1 - All about Areva's Mining Activities (Interview with Sebastien de Montessus, General Director of Areva's Mining Activities, Ongoing Progress, The Core of Areva's Mining Activities Work); 2 - The Foundation of Areva's Mining Activities Approach (Values and Principles, Governance, Commitments); 3 - Reporting on Areva's Mining Activities (Scope, Relevance of Indicators, Outlook); 4 - Being a Responsible Mining Stakeholder (Actions, Reducing Industrial Risks, Ensuring the Protection of Workers and Populations, Consuming Water and Energy Resources in a Rational Way, Preserving Biodiversity, Managing Waste Rock and Mine Tailings over Time, Sustainable Presence, Contribution to Social Development); 5 - Glossary

  15. The difficulties in the development of mining tourism projects: the case of La Unión Mining District (SE Spain

    Directory of Open Access Journals (Sweden)

    Héctor M.Conesa

    2010-10-01

    Full Text Available Mine sites are atypical industrial sites because they encompass not only economic but also landscape and anthropologic components. The need of developing new economic opportunities in areas, where a “mining monoculture” was the economic backbone, has resulted in the re-interpretation of mining activity from a cultural viewpoint. Some traditional mining towns from both, recent and ancient times, have forgone mining activity and have become new tourist attractions sites. However, the process of developing tourism in these zones is not easy and necessarily incorporates social, economic and environmental requirements. This paper describes the constraints, possibilities and efforts that meet in the former mining town of La Unión, Southeast Spain. It will be investigated in a critic point of view the current projects that, though in low number, try to preserve the identity and history of the town while generating relatively significant economic incomes.

  16. Collaborative Data Mining

    Science.gov (United States)

    Moyle, Steve

    Collaborative Data Mining is a setting where the Data Mining effort is distributed to multiple collaborating agents - human or software. The objective of the collaborative Data Mining effort is to produce solutions to the tackled Data Mining problem which are considered better by some metric, with respect to those solutions that would have been achieved by individual, non-collaborating agents. The solutions require evaluation, comparison, and approaches for combination. Collaboration requires communication, and implies some form of community. The human form of collaboration is a social task. Organizing communities in an effective manner is non-trivial and often requires well defined roles and processes. Data Mining, too, benefits from a standard process. This chapter explores the standard Data Mining process CRISP-DM utilized in a collaborative setting.

  17. Coal mine site reclamation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-02-15

    Coal mine sites can have significant effects on local environments. In addition to the physical disruption of land forms and ecosystems, mining can also leave behind a legacy of secondary detrimental effects due to leaching of acid and trace elements from discarded materials. This report looks at the remediation of both deep mine and opencast mine sites, covering reclamation methods, back-filling issues, drainage and restoration. Examples of national variations in the applicable legislation and in the definition of rehabilitation are compared. Ultimately, mine site rehabilitation should return sites to conditions where land forms, soils, hydrology, and flora and fauna are self-sustaining and compatible with surrounding land uses. Case studies are given to show what can be achieved and how some landscapes can actually be improved as a result of mining activity.

  18. Treating mine water

    Energy Technology Data Exchange (ETDEWEB)

    Matlak, E S; Kochegarova, L V; Zaslavskaya, I Yu

    1980-10-01

    Taking into account the negative influence of mine waters with suspended matter on the natural environment on the surface, the maximum treatment of mine water underground, is proposed. It is noted that full treatment of mine water, using conventional filtration methods, would be rather expensive, but a limited treatment of mine water is possible. Such treated mine water can be used in dust suppression and fire fighting systems. Mine water treated underground should be free of any odor, with pH level ranging from 6 to 9.5, with suspended matter content not exceeding 50 mg/l and coli-titre not less than 300 cm$SUP$3. It is suggested that water treatment to produce water characterized by these parameters is possible and economical. Recommendations on construction of underground sedimentation tanks and channels, and a hydraulic system of cleaning sedimentation tanks are proposed. The settling would be stored underground in abandoned workings. (2 refs.) (In Russian)

  19. Data mining concepts, methods and applications in management and engineering design

    CERN Document Server

    Yin, Yong; Tang, Jiafu; Zhu, JianMing

    2011-01-01

    Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems. Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects such as customer analysis. It covers almost all managerial activities of a company, including: * supply chain design, * product development, * manufacturing system design, * product quality control, and * preservation of privacy. Incorporating recent developments of data

  20. Treatment of mine-water from decommissioning uranium mines

    International Nuclear Information System (INIS)

    Fan Quanhui

    2002-01-01

    Treatment methods for mine-water from decommissioning uranium mines are introduced and classified. The suggestions on optimal treatment methods are presented as a matter of experience with decommissioned Chenzhou Uranium Mine

  1. Implementation of Paste Backfill Mining Technology in Chinese Coal Mines

    Science.gov (United States)

    Chang, Qingliang; Zhou, Huaqiang; Bai, Jianbiao

    2014-01-01

    Implementation of clean mining technology at coal mines is crucial to protect the environment and maintain balance among energy resources, consumption, and ecology. After reviewing present coal clean mining technology, we introduce the technology principles and technological process of paste backfill mining in coal mines and discuss the components and features of backfill materials, the constitution of the backfill system, and the backfill process. Specific implementation of this technology and its application are analyzed for paste backfill mining in Daizhuang Coal Mine; a practical implementation shows that paste backfill mining can improve the safety and excavation rate of coal mining, which can effectively resolve surface subsidence problems caused by underground mining activities, by utilizing solid waste such as coal gangues as a resource. Therefore, paste backfill mining is an effective clean coal mining technology, which has widespread application. PMID:25258737

  2. A mine of energy

    International Nuclear Information System (INIS)

    Fallon, M.

    1982-01-01

    In July 1978 the then Union Corporation (which is a wholly-owned Subsidiary of the larger Gencor Group) announced its intention to develop Beisa mine in the Orange Free State. They started up a medium sized uranium mine with gold as a by-product. The main idea was for the processing of uranium. The planning of the uranium recovery plant, the actual mining, and the recovery and extraction of uranium are discussed

  3. Uranium mining in Saskatchewan

    International Nuclear Information System (INIS)

    Scales, M.

    2006-01-01

    The mines of northern Saskatchewan make Canada the worlds leading uranium producer in Canada supplied 29% of global demand, or 11.60 million tonnes of the metal in 2004. Here are two bright ideas - how to mine an orebody by neither pit nor underground method, and how to mine high-grade ore without miners - that Cogema and Cameco are pursuing in the Athabasca Basin

  4. Nuclear knowledge preservation

    International Nuclear Information System (INIS)

    Bettencourt, Marcia Pires da Luz

    2009-01-01

    The nuclear technology has encouraged the world development and brought a number of benefits to society. These benefits occurred in important social sectors such as Agriculture, Industry, Health Sciences, Environmental Sciences and the production of energy. The research in the nuclear area is justified, accordingly, as an important factor for science development, technology and innovation. Despite the importance of nuclear energy, there is a collapse in the generation, transmission and sharing of nuclear knowledge. The threat of regression in this area is evidenced by the difficulty of generating new knowledge and practices regarding the maintenance of some critical areas. This project focuses its attention on studying, specifically, the lack of young engineers and technical professionals to replace the older, considered this, an alarming situation. Therefore, it is necessary to identify and record the key skills of experienced workers, through a set of tools to elicitation (capture) this knowledge, as expertise is mainly with people, and is lost when they leave the organization. Against, the Knowledge Management provides methodologies for the process of stimulating the creation, collection and knowledge dissemination process, in order to achieve strategic objectives. This study aims to contribute to the building of a model for the Brazilian nuclear knowledge preservation and, therefore, contributes to the maintenance and innovation of activities in this area. (author)

  5. Partnership in mining

    Energy Technology Data Exchange (ETDEWEB)

    Haslam, R

    1988-04-01

    This paper discusses the benefits resulting from mutual cooperation and information exchange between the UK and USA coal industries. The aim of this cooperation is to promote safe and efficient extraction and profitable use of coal. Advanced mining technologies and mechanisation of the coal mines are some of the results of research cooperation between British Coal and the US Bureau of Mines. In addition, Britain has studied and put into good use the management styles, working practices and pay structure, and mining engineering adopted in the USA.

  6. Solution mining economics

    International Nuclear Information System (INIS)

    Hunkin, G.G.

    1980-01-01

    The field of application of in-situ solution mining of uranium is described and areas of competition with open pit and underground mining identified. The influence of high interest rates and dollar inflation on present values and rate of return is shown to be minimized by low capitalization and short construction lead times typical of in-situ leaching ventures. A scheme of three major project account divisions is presented and basic parameters necessary for mine planning are listed. 1979 cost ranges and useful methods of estimation of capital and operating costs are given for the in-situ uranium mining method

  7. Mining face equipment

    Energy Technology Data Exchange (ETDEWEB)

    G, Litvinskiy G; Babyuk, G V; Yakovenko, V A

    1981-01-07

    Mining face equipment includes drilling advance wells, drilling using explosives on the contour bore holes, loading and transporting the crushed mass, drilling reinforcement shafts, injecting reinforcement compounds and moving the timber. Camouflet explosives are used to form relaxed rock stress beyond the mining area to decrease costs of reinforcing the mining area by using nonstressed rock in the advance well as support. The strengthening solution is injected through advanced cementing wells before drilling the contour bores as well as through radial cementing wells beyond the timbers following loading and transport of the mining debris. The advance well is 50-80 m.

  8. The mines of Jackymov

    International Nuclear Information System (INIS)

    Ramsey, L.J.

    1985-01-01

    The history of the mines in the vicinity of Jackymov, a small town in Central Europe is given. These mines have been worked for several hundred years and from them has been brought forth a variety of products including silver, uranium and radium, the latter being isolated from Jackymov pitch-blende and identified by Marie Curie. The health effects of the miners mining radioactive ores are briefly discussed. The development of Jackymov as a spa resort using the mine water containing radium is also described. (U.K.)

  9. Uranium mining and milling

    International Nuclear Information System (INIS)

    Floeter, W.

    1976-01-01

    In this report uranium mining and milling are reviewed. The fuel cycle, different types of uranium geological deposits, blending of ores, open cast and underground mining, the mining cost and radiation protection in mines are treated in the first part of this report. In the second part, the milling of uranium ores is treated, including process technology, acid and alkaline leaching, process design for physical and chemical treatment of the ores, and the cost. Each chapter is clarified by added figures, diagrams, tables, and flowsheets. (HK) [de

  10. Mine ventilation engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hall, C.J.

    1981-01-01

    This book on mine ventilation covers psychometrics, airflow through roadways and ducts, natural ventilation, fans, instruments, ventilation surveys, auxiliary ventilation, air quality, and planning and economics.

  11. Responsible Mining: A Human Resources Strategy for Mine Development Project

    OpenAIRE

    Sampathkumar, Sriram (Ram)

    2012-01-01

    Mining is a global industry. Most mining companies operate internationally, often in remote, challenging environments and consequently frequently have respond to unusual and demanding Human Resource (HR) requirements. It is my opinion that the strategic imperative behind success in mining industry is responsible mining. The purpose of this paper is to examine how an effective HR strategy can be a competitive advantage that contributes to the success of a mining project in the global mining in...

  12. Mining engineer requirements in a German coal mine

    Energy Technology Data Exchange (ETDEWEB)

    Rauhut, F J

    1985-10-01

    Basic developments in German coal mines, new definitions of working areas of mining engineers, and groups of requirements in education are discussed. These groups include: requirements of hard-coal mining at great depth and in extended collieries; application of process technology and information systems in semi-automated mines; thinking in processes and systems; organizational changes; future requirements of mining engineers; responsibility of the mining engineer for employees and society.

  13. User Experience and Heritage Preservation

    Science.gov (United States)

    Orfield, Steven J.; Chapman, J. Wesley; Davis, Nathan

    2011-01-01

    In considering the heritage preservation of higher education campus buildings, much of the attention gravitates toward issues of selection, cost, accuracy, and value, but the model for most preservation projects does not have a clear method of achieving the best solutions for meeting these targets. Instead, it simply relies on the design team and…

  14. Sustainable Mining Environment: Technical Review of Post-mining Plans

    Directory of Open Access Journals (Sweden)

    Restu Juniah

    2017-12-01

    Full Text Available The mining industry exists because humans need mining commodities to meet their daily needs such as motor vehicles, mobile phones, electronic equipment and others. Mining commodities as mentioned in Government Regulation No. 23 of 2010 on Implementation of Mineral and Coal Mining Business Activities are radioactive minerals, metal minerals, nonmetallic minerals, rocks and coal. Mineral and coal mining is conducted to obtain the mining commodities through production operations. Mining and coal mining companies have an obligation to ensure that the mining environment in particular after the post production operation or post mining continues. The survey research aims to examine technically the post-mining plan in coal mining of PT Samantaka Batubara in Indragiri Hulu Regency of Riau Province towards the sustainability of the mining environment. The results indicate that the post-mining plan of PT Samantaka Batubara has met the technical aspects required in post mining planning for a sustainable mining environment. Postponement of post-mining land of PT Samantaka Batubara for garden and forest zone. The results of this study are expected to be useful and can be used by stakeholders, academics, researchers, practitioners and associations of mining, and the environment.

  15. DTFP-Growth: Dynamic Threshold-Based FP-Growth Rule Mining Algorithm Through Integrating Gene Expression, Methylation, and Protein-Protein Interaction Profiles.

    Science.gov (United States)

    Mallik, Saurav; Bhadra, Tapas; Mukherji, Ayan; Mallik, Saurav; Bhadra, Tapas; Mukherji, Ayan; Mallik, Saurav; Bhadra, Tapas; Mukherji, Ayan

    2018-04-01

    Association rule mining is an important technique for identifying interesting relationships between gene pairs in a biological data set. Earlier methods basically work for a single biological data set, and, in maximum cases, a single minimum support cutoff can be applied globally, i.e., across all genesets/itemsets. To overcome this limitation, in this paper, we propose dynamic threshold-based FP-growth rule mining algorithm that integrates gene expression, methylation and protein-protein interaction profiles based on weighted shortest distance to find the novel associations among different pairs of genes in multi-view data sets. For this purpose, we introduce three new thresholds, namely, Distance-based Variable/Dynamic Supports (DVS), Distance-based Variable Confidences (DVC), and Distance-based Variable Lifts (DVL) for each rule by integrating co-expression, co-methylation, and protein-protein interactions existed in the multi-omics data set. We develop the proposed algorithm utilizing these three novel multiple threshold measures. In the proposed algorithm, the values of , , and are computed for each rule separately, and subsequently it is verified whether the support, confidence, and lift of each evolved rule are greater than or equal to the corresponding individual , , and values, respectively, or not. If all these three conditions for a rule are found to be true, the rule is treated as a resultant rule. One of the major advantages of the proposed method compared with other related state-of-the-art methods is that it considers both the quantitative and interactive significance among all pairwise genes belonging to each rule. Moreover, the proposed method generates fewer rules, takes less running time, and provides greater biological significance for the resultant top-ranking rules compared to previous methods.

  16. Contact dermatitis caused by preservatives.

    Science.gov (United States)

    Yim, Elizabeth; Baquerizo Nole, Katherine L; Tosti, Antonella

    2014-01-01

    Preservatives are biocidal chemicals added to food, cosmetics, and industrial products to prevent the growth of microorganisms. They are usually nontoxic and inexpensive and have a long shelf life. Unfortunately, they commonly cause contact dermatitis. This article reviews the most important classes of preservatives physicians are most likely to encounter in their daily practice, specifically isothiazolinones, formaldehyde and formaldehyde-releasers, iodopropynyl butylcarbamate, methyldibromoglutaronitrile, and parabens. For each preservative mentioned, the prevalence of sensitization, clinical presentation of contact dermatitis, patch testing concentrations, cross reactions, and related legislation will be discussed. Mandatory labeling of preservatives is required in some countries, but not required in others. Until policies are made, physicians and patients must be proactive in identifying potential sensitizers and removing their use. We hope that this article will serve as a guide for policy makers in creating legislation and future regulations on the use and concentration of certain preservatives in cosmetics and industrial products.

  17. AprioriGWAS, a new pattern mining strategy for detecting genetic variants associated with disease through interaction effects.

    Science.gov (United States)

    Zhang, Qingrun; Long, Quan; Ott, Jurg

    2014-06-01

    Identifying gene-gene interaction is a hot topic in genome wide association studies. Two fundamental challenges are: (1) how to smartly identify combinations of variants that may be associated with the trait from astronomical number of all possible combinations; and (2) how to test epistatic interaction when all potential combinations are available. We developed AprioriGWAS, which brings two innovations. (1) Based on Apriori, a successful method in field of Frequent Itemset Mining (FIM) in which a pattern growth strategy is leveraged to effectively and accurately reduce search space, AprioriGWAS can efficiently identify genetically associated genotype patterns. (2) To test the hypotheses of epistasis, we adopt a new conditional permutation procedure to obtain reliable statistical inference of Pearson's chi-square test for the [Formula: see text] contingency table generated by associated variants. By applying AprioriGWAS to age-related macular degeneration (AMD) data, we found that: (1) angiopoietin 1 (ANGPT1) and four retinal genes interact with Complement Factor H (CFH). (2) GO term "glycosaminoglycan biosynthetic process" was enriched in AMD interacting genes. The epistatic interactions newly found by AprioriGWAS on AMD data are likely true interactions, since genes interacting with CFH are retinal genes, and GO term enrichment also verified that interaction between glycosaminoglycans (GAGs) and CFH plays an important role in disease pathology of AMD. By applying AprioriGWAS on Bipolar disorder in WTCCC data, we found variants without marginal effect show significant interactions. For example, multiple-SNP genotype patterns inside gene GABRB2 and GRIA1 (AMPA subunit 1 receptor gene). AMPARs are found in many parts of the brain and are the most commonly found receptor in the nervous system. The GABRB2 mediates the fastest inhibitory synaptic transmission in the central nervous system. GRIA1 and GABRB2 are relevant to mental disorders supported by multiple

  18. Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection

    Science.gov (United States)

    Sakuma, Jun; Wright, Rebecca N.

    Privacy-preserving classification is the task of learning or training a classifier on the union of privately distributed datasets without sharing the datasets. The emphasis of existing studies in privacy-preserving classification has primarily been put on the design of privacy-preserving versions of particular data mining algorithms, However, in classification problems, preprocessing and postprocessing— such as model selection or attribute selection—play a prominent role in achieving higher classification accuracy. In this paper, we show generalization error of classifiers in privacy-preserving classification can be securely evaluated without sharing prediction results. Our main technical contribution is a new generalized Hamming distance protocol that is universally applicable to preprocessing and postprocessing of various privacy-preserving classification problems, such as model selection in support vector machine and attribute selection in naive Bayes classification.

  19. Exceptional preservation of Miocene pollen: plasmolysis captured in salt?

    Energy Technology Data Exchange (ETDEWEB)

    Durska, W.

    2016-07-01

    Exceptionally well-preserved Miocene pollen from the Bochnia salt mine of southern Poland is reported herein. The halite deposits within the salt mine belonging to Late Badenian (Miocene) marine evaporites originated in the Paratethys. Rounded and angular structures are present inside pollen grains. On the basis of the similarity with plasmolyzed pollen grains of modern plants, these structures are considered to represent cytoplasms plasmolyzed in the condensed brine prior to fossilization. Two forms of plasmolyzed cytoplasms (concave and convex) can be observed in modern pollen. Both are distinguished in the investigated fossil material. In porate and colporate grains the shape of the plasmolyzed cellular content is concave while in inaperturate it is convex. The plasmolysis form depends on the type of apertures and pollen shape. The percentage of pollen with fossilized cytoplasms within individual taxa is a valuable environmental indicator, as it depends on the proximity of the pollen-producing plant assemblages to the depositional setting. (Author)

  20. Mining robotics sensors

    CSIR Research Space (South Africa)

    Green, JJ

    2012-04-01

    Full Text Available of threedimensional cameras (SR 4000 and XBOX Kinect) and a thermal imaging sensor (FLIR A300) in order to create 3d thermal models of narrow mining stopes. This information can be used in determining the risk of rockfall in an underground mine, which is a major...

  1. Cementitious backfill in mining

    Energy Technology Data Exchange (ETDEWEB)

    Taute, A; Spice, J; Wingrove, A C [Van Niekerk, Kleyn Edwards (South Africa)

    1993-03-01

    This article describes the need for increased usage of backfill material in mining and presents some of the considerations for use of cemented materials. Laboratory test results obtained using a variety of cementitious binders and mine tailings are presented. 3 figs., 1 tab.

  2. Mining Department computer systems

    Energy Technology Data Exchange (ETDEWEB)

    1979-09-01

    Describes the main computer systems currently available, or being developed by the Mining Department of the UK National Coal Board. They are primarily for the use of mining and specialist engineers, but some of them have wider applications, particularly in the research and development and management statistics fields.

  3. Genetic process mining

    NARCIS (Netherlands)

    Aalst, van der W.M.P.; Alves De Medeiros, A.K.; Weijters, A.J.M.M.; Ciardo, G.; Darondeau, P.

    2005-01-01

    The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discover process models from event logs, i.e., events logged by some information system are used to extract information about

  4. Ghana - Mining and Development

    OpenAIRE

    Mohan, P.C.

    2004-01-01

    The objectives of the project ($9.37 million, 1996-2001) were to (a) enhance the capacity of the mining sector institutions to carry out their functions of encouraging and regulating investments in the mining sector in an environmentally sound manner and (b) support the use of techniques and mechanisms that will improve productivity, financial viability and reduce the environmental impact of ...

  5. Northeast Church Rock Mine

    Science.gov (United States)

    Northeast Church Rock Mine, a former uranium mine 17 miles northeast of Gallup, NM in the Pinedale Chapter of the Navajo Nation. EPA is working with NNEPA to oversee cleanup work by United Nuclear Corporation, a company owned by General Electric (GE).

  6. Distributed genetic process mining

    NARCIS (Netherlands)

    Bratosin, C.C.; Sidorova, N.; Aalst, van der W.M.P.

    2010-01-01

    Process mining aims at discovering process models from data logs in order to offer insight into the real use of information systems. Most of the existing process mining algorithms fail to discover complex constructs or have problems dealing with noise and infrequent behavior. The genetic process

  7. Reclamation of the mining areas by Nuclemon

    International Nuclear Information System (INIS)

    Torezan, M.J.

    1987-01-01

    This work refers to the reclamation of mine land, fundamental condition to the preservation of the environment. The NUCLEMON - ''Nuclebras de Monazita e Associadas Ltda is dedicated to prospecting activities, exploration, exploitation and industrialization of heavy minerals, ilmenite, monazite, zirconite and rutil. The process of reclamation of the areas starts at the same tinic as the exploitation. The excavation isn't made with explosives, also durung emission doesn't occur. The drainning of pit is made by the pumping of wather for the pits rehabilitation, avoiding the pumping of the surrounding. At the completation of the exploitation restarts the agricultural activity al-ready existing in the area. Sometimes the owner of the soil prefers to preserve some of the pits for the formation of small lakes for the use of wild focal. (C.D.G.) [pt

  8. Food preservation by irradiation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1978-02-15

    As shortages of food and energy still continue to constitute the major threats to the well-being of the human race, all actions aiming at overcoming these problems must be assigned vital importance. Of the two complementary ways of solving the food problem (i.e., increasing the production of food and decreasing the spoilage of food) a novel method designed to contribute to the latter purpose has been discussed at this symposium hosted by The Netherlands and held under the aegis of the Food and Agriculture Organization of the United Nations, the International Atomic Energy Agency and the World Health Organization. Progress made since the last symposium of this kind (Bombay, India, 1972) was reviewed from the technological, economic and wholesomeness points of view by participants from 39 countries (60% of the latter were of the developing world). From the reports presented on the use of radiations to control physiological changes in plants, feasibility of radiation preservation of potatoes, onions, garlic, as well as of some tropical and subtropical fruits (mangoes, papayas, litchis and avocado) was confirmed. For potatoes, onions and mangoes, optimal conditions of treatment and storage were established on a larger scale, combined with sizeable consumer trials. Combinations of ionizing radiation with chemicals (salycilic acid, for potatoes), and physical agents (ultraviolet rays, for papayas) have been reported to be successful against the incidence of rot. A considerable number of papers dealt with the control of microbiological spoilage of foods. Work since 1972 has shown that radurization of fruits and vegetables (bananas, mangoes, dried dates, endive, chickory, onions, soup-greens), meat, poultry, marine products (mackerel, cod and plaice fillets, shrimps), decontamination of food ingredients and food technology aids (enzyme preparations, proteins, starch, spices), radappertization of meat and animal feedstuffs as well as combination treatments with salt, heat

  9. Food preservation by irradiation

    International Nuclear Information System (INIS)

    1978-01-01

    As shortages of food and energy still continue to constitute the major threats to the well-being of the human race, all actions aiming at overcoming these problems must be assigned vital importance. Of the two complementary ways of solving the food problem (i.e., increasing the production of food and decreasing the spoilage of food) a novel method designed to contribute to the latter purpose has been discussed at this symposium hosted by The Netherlands and held under the aegis of the Food and Agriculture Organization of the United Nations, the International Atomic Energy Agency and the World Health Organization. Progress made since the last symposium of this kind (Bombay, India, 1972) was reviewed from the technological, economic and wholesomeness points of view by participants from 39 countries (60% of the latter were of the developing world). From the reports presented on the use of radiations to control physiological changes in plants, feasibility of radiation preservation of potatoes, onions, garlic, as well as of some tropical and subtropical fruits (mangoes, papayas, litchis and avocado) was confirmed. For potatoes, onions and mangoes, optimal conditions of treatment and storage were established on a larger scale, combined with sizeable consumer trials. Combinations of ionizing radiation with chemicals (salycilic acid, for potatoes), and physical agents (ultraviolet rays, for papayas) have been reported to be successful against the incidence of rot. A considerable number of papers dealt with the control of microbiological spoilage of foods. Work since 1972 has shown that radurization of fruits and vegetables (bananas, mangoes, dried dates, endive, chickory, onions, soup-greens), meat, poultry, marine products (mackerel, cod and plaice fillets, shrimps), decontamination of food ingredients and food technology aids (enzyme preparations, proteins, starch, spices), radappertization of meat and animal feedstuffs as well as combination treatments with salt, heat

  10. Data mining for service

    CERN Document Server

    2014-01-01

    Virtually all nontrivial and modern service related problems and systems involve data volumes and types that clearly fall into what is presently meant as "big data", that is, are huge, heterogeneous, complex, distributed, etc. Data mining is a series of processes which include collecting and accumulating data, modeling phenomena, and discovering new information, and it is one of the most important steps to scientific analysis of the processes of services.  Data mining application in services requires a thorough understanding of the characteristics of each service and knowledge of the compatibility of data mining technology within each particular service, rather than knowledge only in calculation speed and prediction accuracy. Varied examples of services provided in this book will help readers understand the relation between services and data mining technology. This book is intended to stimulate interest among researchers and practitioners in the relation between data mining technology and its application to ...

  11. African mining '91

    International Nuclear Information System (INIS)

    1991-01-01

    The second 'African Mining' conference was held in June 1991, and followed the first event held in May 1987. That full four-year period was characterized by substantial changes in the political and economic climate of many countries in both hemispheres. The results of many of these changing facets of our industry are described in the papers in African Mining'91. Many of the papers deal with advances in technology, which is the main reason for the meeting. There are 37 papers under the headings general, mining, metallurgy and geology and exploration. Most papers are concerned with gold, copper and mineral mining. One paper concerning uranium mining operations in Namibia is indexed separately. (author)

  12. Contamination versus preservation of cosmetics

    DEFF Research Database (Denmark)

    Lundov, Michael Dyrgaard; Moesby, Lise; Zachariae, Claus

    2009-01-01

    Cosmetics with high water content are at a risk of being contaminated by micro-organisms that can alter the composition of the product or pose a health risk to the consumer. Pathogenic micro-organisms such as Staphylococcus aureus and Pseudomonas aeruginosa are frequently found in contaminated...... cosmetics. In order to avoid contamination of cosmetics, the manufacturers add preservatives to their products. In the EU and the USA, cosmetics are under legislation and all preservatives must be safety evaluated by committees. There are several different preservatives available but the cosmetic market...

  13. Radioecological challenges for mining

    Energy Technology Data Exchange (ETDEWEB)

    Vesterbacka, P.; Ikaeheimonen, T.K.; Solatie, D. [Radiation and Nuclear Safety Authority (Finland)

    2014-07-01

    In Finland, mining became popular in the mid-1990's when the mining amendments to the law made the mining activities easier for foreign companies. Also the price of the minerals rose and mining in Finland became economically profitable. Expanding mining industry brought new challenges to radiation safety aspect since radioactive substances occur in nearly all minerals. In Finnish soil and bedrock the average crystal abundance of uranium and thorium are 2.8 ppm and 10 ppm, respectively. It cannot be predicted beforehand how radionuclides behave in the mining processes which why they need to be taken into account in mining activities. Radiation and Nuclear Safety Authority (STUK) has given a national guide ST 12.1 based on the Finnish Radiation Act. The guide sets the limits for radiation doses to the public also from mining activities. In general, no measures to limit the radiation exposure are needed, if the dose from the operation liable to cause exposure to natural radiation is no greater than 0.1 mSv per year above the natural background radiation dose. If the exposure of the public may be higher than 0.1 mSv per year, the responsible party must provide STUK a plan describing the measures by which the radiation exposure is to be kept as low as is reasonably achievable. In that case the mining company responsible company has to make a radiological baseline study. The baseline study must focus on the environment that the mining activities may impact. The study describes the occurrence of natural radioactivity in the environment before any mining activities are started. The baseline study lasts usually for two to three years in natural circumstances. Based on the baseline study measurements, detailed information of the existing levels of radioactivity in the environment can be attained. Once the mining activities begin, it is important that the limits are set for the wastewater discharges to the environment and environmental surveillance in the vicinity of

  14. Ideate about building green mine of uranium mining and metallurgy

    International Nuclear Information System (INIS)

    Shi Zuyuan

    2012-01-01

    Analysing the current situation of uranium mining and metallurgy; Setting up goals for green uranium mining and metallurgy, its fundamental conditions, Contents and measures. Putting forward an idea to combine green uranium mining and metallurgy with the state target for green mining, and keeping its own characteristics. (author)

  15. Responsible Development of Areva's Mining Activities. 2010 report

    International Nuclear Information System (INIS)

    2010-01-01

    After a map indicating the location of the main Areva's mining sites, this report provides several key figures and data and discusses the evolution of this activity which is part of the business core of the AREVA company. It gives a statement of values and principles, governance and commitments related to this activity. In order to report this activity, it addresses several topics: reduction of industrial risks, protection of workers and populations, rational consumption of water and energy resources, biodiversity preservation, management over time of waste rock and mining tailings, sustainable integration into territories, and contribution to social development. This document is proposed in French and in English

  16. Federal Support for Preserve America

    Science.gov (United States)

    Mississippi's Heritage Tourism Industry Post Hurricane Katrina also received a $150,000 Preserve America Grant Arkansas Delta, one for music, one for African-American history, and one for agriculture. The project will

  17. Cultural Preservation Program for Alaska

    Science.gov (United States)

    Barbaran, Francisco Ramon

    2011-01-01

    In this technical report, an innovative cultural preservation program for implementation in Athabascan villages is presented. The parameters for success in implementing such a project is discussed based on a workshop with Athabascan elders.

  18. Mining and mining authorities in Saarland 2016. Mining economy, mining technology, occupational safety, environmental protection, statistics, mining authority activities. Annual report

    International Nuclear Information System (INIS)

    2016-01-01

    The annual report of the Saarland Upper Mining Authority provides an insight into the activities of mining authorities. Especially, the development of the black coal mining, safety and technology of mining as well as the correlation between mining and environment are stressed.

  19. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... options further? Fertility Preservation - Where Does It Fit? Options for Fertility Preservation The following diagram gives a brief description of fertility preservation options available to children diagnosed with cancer before and ...

  20. Hereditary History Preserving Bisimilarity Is Undecidable

    DEFF Research Database (Denmark)

    Jurdzinski, Marcin; Nielsen, Mogens

    2000-01-01

    History preserving bisimilarity (hp-bisimilarity) and hereditary history preserving bisimilarity (hhp-bisimilarity) are behavioural equivalences taking into account causal relationships between events of concurrent systems. Their prominent feature is being preserved under action refinement...

  1. Fertility Preservation for Children Diagnosed with Cancer

    Science.gov (United States)

    ... Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu ... with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for ...

  2. Mining toward the year 2000

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    Mining in South Africa to this present day has not been a case of dramatic development, rather a steady technical progress, assisted by a rising product market price. Prominent men in the mining industry look at the future in terms of that logical development. Coverage is given to gold, mine unionization, coal, rock bursts, ventilation, uranium and ocean mining

  3. Open pit mining of uranium

    International Nuclear Information System (INIS)

    Wood, J.T.

    1977-01-01

    The Jackpile--Paquate Mines of the Anaconda Company are on the Laguna Indian Reservation midway between Grants and Albuquerque, New Mexico. The open pit mining of uranium ore at those mines is conducted in three separate operations (stripping, mining, and ore haul)

  4. Australian uranium mining policy

    International Nuclear Information System (INIS)

    Fisk, B.

    1985-01-01

    Australian government policy is explained in terms of adherence to the Non-Proliferation Treaty. Two alleged uncertainties are discussed: the future of Australian mining industry as a whole -on which it is said that Australian uranium mines will continue to be developed; and detailed commercial policy of the Australian government - on which it is suggested that the three-mines policy of limited expansion of the industry would continue. Various aspects of policy, applying the principles of the NPT, are listed. (U.K.)

  5. Mining on the Mesa

    Energy Technology Data Exchange (ETDEWEB)

    Sprouls, M.W.

    1994-10-01

    Peabody Western Coal Co. is the owner of Black Mesa and Kayenta coal opencast mines, both sited on Hopi and Navajo lands. 93% of the employees are native American, mostly Navajo. Kayenta is the larger and extracts coal with draglines. Sulphur content is high so the coal has to be analyzed and carefully blended before use. Black Mesa also uses draglines, here quality control is not as important as it is at Kayenta. Coal is transported to power stations using slurry pipelines. Both mines are heavily involved in land reclamation, leaving a landscape that makes better grazing than it did before mining. 2 figs.

  6. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for ...

  7. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for Patients Many adult ...

  8. Selection of mining method for No.3 uranium ore body in the independent mining area at a uranium mine

    International Nuclear Information System (INIS)

    Ding Fulong; Ding Dexin; Ye Yongjun

    2010-01-01

    Mining operation in the existed mining area at a uranium mine is near completion and it is necessary to mine the No.3 uranium ore body in another mining area at the mine. This paper, based on the geological conditions, used analogical method for analyzing the feasible methods and the low cost and high efficiency mining method was suggested for the No.3 ore body in the independent mining area at the uranium mine. (authors)

  9. Security Measures in Data Mining

    OpenAIRE

    Anish Gupta; Vimal Bibhu; Rashid Hussain

    2012-01-01

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determin...

  10. Mining activities at Neyveli

    International Nuclear Information System (INIS)

    Boopathy, P.V.; Rathinavel, R.

    1993-01-01

    Mining activities at lignite areas around Neyveli are described. Measures taken to safeguard the environment from despoliation of land, air pollution, noise pollution and effluents are described. (M.G.B.)

  11. Radiation in mines

    International Nuclear Information System (INIS)

    Rose, H.J.M.

    1982-01-01

    Radiation in mines is primarily associated with, but not restricted to, the exploitation of uranium bearing orebodies. The intent of this chapter is to convey some aspects of radiation control in the mining industry, the behaviour of the parent radon and its daughter products. An attempt was made to demonstrate that anything less than complete diligence by the ventilation personnel could result in rapid deterioration of the mine environment, and consequently high exposure rates. When the maximum annual exposure limit is 4,0 WLM (Working level month exposure) the ventilation official is not allowed the privilege of making an error. Ventilation planning in uranium mines is of prime importance and is very much a group involvement

  12. Pumps in mining

    Energy Technology Data Exchange (ETDEWEB)

    1979-01-01

    This article looks at the pump industry as a whole, its historical links with the mining industry, their parallel develop ment, and at the individual manufacturers and pumps, services and auxillary products they have to offer.

  13. Data mining in agriculture

    CERN Document Server

    Mucherino, Antonio; Pardalos, Panos M

    2009-01-01

    Data Mining in Agriculture represents a comprehensive effort to provide graduate students and researchers with an analytical text on data mining techniques applied to agriculture and environmental related fields. This book presents both theoretical and practical insights with a focus on presenting the context of each data mining technique rather intuitively with ample concrete examples represented graphically and with algorithms written in MATLAB®. Examples and exercises with solutions are provided at the end of each chapter to facilitate the comprehension of the material. For each data mining technique described in the book variants and improvements of the basic algorithm are also given. Also by P.J. Papajorgji and P.M. Pardalos: Advances in Modeling Agricultural Systems, 'Springer Optimization and its Applications' vol. 25, ©2009.

  14. Acid Mine Drainage Treatment

    National Research Council Canada - National Science Library

    Fripp, Jon

    2000-01-01

    .... Acid mine drainage (AMD) can have severe impacts to aquatic resources, can stunt terrestrial plant growth and harm wetlands, contaminate groundwater, raise water treatment costs, and damage concrete and metal structures...

  15. Automatic identification in mining

    Energy Technology Data Exchange (ETDEWEB)

    Puckett, D; Patrick, C [Mine Computers and Electronics Inc., Morehead, KY (United States)

    1998-06-01

    The feasibility of monitoring the locations and vital statistics of equipment and personnel in surface and underground mining operations has increased with advancements in radio frequency identification (RFID) technology. This paper addresses the use of RFID technology, which is relatively new to the mining industry, to track surface equipment in mine pits, loading points and processing facilities. Specific applications are discussed, including both simplified and complex truck tracking systems and an automatic pit ticket system. This paper concludes with a discussion of the future possibilities of using RFID technology in mining including monitoring heart and respiration rates, body temperatures and exertion levels; monitoring repetitious movements for the study of work habits; and logging air quality via personnel sensors. 10 refs., 5 figs.

  16. Uranium mines of Tajikistan

    International Nuclear Information System (INIS)

    Razykov, Z.A; Gusakov, E.G.; Marushenko, A.A.; Botov, A.Yu.; Yunusov, M.M.

    2002-12-01

    The book describes location laws, the main properties of geological structure and industrial perspectives for known uranium mines of the Republic of Tajikistan. Used methods of industrial processing of uranium mines are described. The results of investigations of technological properties of main types of uranium ores and methods of industrial processing of some of them are shown. Main properties of uranium are shortly described as well as problems, connected with it, which arise during exploitation, mining and processing of uranium ores. The main methods of solution of these problems are shown. The book has interest for specialists of mining, geological, chemical, and technological fields as well as for students of appropriate universities. This book will be interested for usual reader, too, if they are interested in mineral resources of their country [ru

  17. Acid mine drainage

    Science.gov (United States)

    Bigham, Jerry M.; Cravotta, Charles A.

    2016-01-01

    Acid mine drainage (AMD) consists of metal-laden solutions produced by the oxidative dissolution of iron sulfide minerals exposed to air, moisture, and acidophilic microbes during the mining of coal and metal deposits. The pH of AMD is usually in the range of 2–6, but mine-impacted waters at circumneutral pH (5–8) are also common. Mine drainage usually contains elevated concentrations of sulfate, iron, aluminum, and other potentially toxic metals leached from rock that hydrolyze and coprecipitate to form rust-colored encrustations or sediments. When AMD is discharged into surface waters or groundwaters, degradation of water quality, injury to aquatic life, and corrosion or encrustation of engineered structures can occur for substantial distances. Prevention and remediation strategies should consider the biogeochemical complexity of the system, the longevity of AMD pollution, the predictive power of geochemical modeling, and the full range of available field technologies for problem mitigation.

  18. Scalable Frequent Subgraph Mining

    KAUST Repository

    Abdelhamid, Ehab

    2017-01-01

    Given an input graph, the Frequent Subgraph Mining (FSM) task finds all subgraphs with frequencies exceeding a given threshold. FSM is crucial for graph analysis, and it is an essential building block in a variety

  19. Ensemble Data Mining Methods

    Data.gov (United States)

    National Aeronautics and Space Administration — Ensemble Data Mining Methods, also known as Committee Methods or Model Combiners, are machine learning methods that leverage the power of multiple models to achieve...

  20. Coal mine subsidence

    International Nuclear Information System (INIS)

    Rahall, N.J.

    1991-05-01

    This paper examines the efficacy of the Department of the Interior's Office of Surface Mining Reclamation and Enforcement's (OSMRE) efforts to implement the federally assisted coal mine subsidence insurance program. Coal mine subsidence, a gradual settling of the earth's surface above an underground mine, can damage nearby land and property. To help protect property owners from subsidence-related damage, the Congress passed legislation in 1984 authorizing OSMRE to make grants of up to $3 million to each state to help the states establish self-sustaining, state-administered insurance programs. Of the 21 eligible states, six Colorado, Indiana, Kentucky, Ohio, West Virginia, and Wyoming applied for grants. This paper reviews the efforts of these six states to develop self-sustaining insurance programs and assessed OSMRE's oversight of those efforts

  1. Privacy-preserving distributed clustering

    NARCIS (Netherlands)

    Erkin, Z.; Veugen, T.; Toft, T.; Lagendijk, R.L.

    2013-01-01

    Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some

  2. Data Stream Mining

    Science.gov (United States)

    Gaber, Mohamed Medhat; Zaslavsky, Arkady; Krishnaswamy, Shonali

    Data mining is concerned with the process of computationally extracting hidden knowledge structures represented in models and patterns from large data repositories. It is an interdisciplinary field of study that has its roots in databases, statistics, machine learning, and data visualization. Data mining has emerged as a direct outcome of the data explosion that resulted from the success in database and data warehousing technologies over the past two decades (Fayyad, 1997,Fayyad, 1998,Kantardzic, 2003).

  3. Coal Mines Security System

    OpenAIRE

    Ankita Guhe; Shruti Deshmukh; Bhagyashree Borekar; Apoorva Kailaswar; Milind E.Rane

    2012-01-01

    Geological circumstances of mine seem to be extremely complicated and there are many hidden troubles. Coal is wrongly lifted by the musclemen from coal stocks, coal washeries, coal transfer and loading points and also in the transport routes by malfunctioning the weighing of trucks. CIL —Coal India Ltd is under the control of mafia and a large number of irregularities can be contributed to coal mafia. An Intelligent Coal Mine Security System using data acquisition method utilizes sensor, auto...

  4. Applied data mining

    CERN Document Server

    Xu, Guandong

    2013-01-01

    Data mining has witnessed substantial advances in recent decades. New research questions and practical challenges have arisen from emerging areas and applications within the various fields closely related to human daily life, e.g. social media and social networking. This book aims to bridge the gap between traditional data mining and the latest advances in newly emerging information services. It explores the extension of well-studied algorithms and approaches into these new research arenas.

  5. Ventilation of uranium mines

    International Nuclear Information System (INIS)

    Francois, Y.; Pradel, J.; Zettwoog, P.; Dumas, M.

    1975-01-01

    In the first part of the paper the authors describe the ventilation of French mines in terms of the primary ventilation system, which brings the outside air close to the working places using the overall structure of the mine to form the airways, and the secondary ventilation system, which is for the distribution of the primary air or for the ventilation of the development drifts and blind tunnels. Brief mention is made of the French regulations on the ventilation of mines in general and uranium mines in particular. The authors describe the equipment used and discuss the installed capacities and air flow per man and per working place. The difficulties encountered in properly ventilating various types of working places are mentioned, such as sub-level development drifts, reinforced stopes, and storage chambers with an artificial crown. The second part of the paper is devoted to computer calculations of the primary ventilation system. It is explained why the Commissariat a l'energie atomique has found it necessary to make these calculations. Without restating the mathematical theories underlying the methods employed, the authors demonstrate how simple measuring instruments and a small-size computer can be used to solve the ventilation problems arising in French mines. Emphasis is given to the layout of the ventilation system and to air flow and negative pressure measurements at the base of the mine. The authors show how calculations can be applied to new heading operations, a change in resistance, the replacement or addition of a ventilator, and a new air inlet or outlet. The authors come to the conclusion that since ventilation is at present the most reliable way of avoiding the pollution of mines, a thorough knowledge of the capabilities in this respect can often help improve working conditions. Despite the progress made, however, constant surveillance of the ventilation systems in uranium mines by a separate team with no responsibility for production problems is

  6. Robotics for mining control

    Energy Technology Data Exchange (ETDEWEB)

    1986-11-01

    In 1982 surveys of the mining industry revealed no applications of robotics existed and none were planned. This report provides a general overview of automation in the mining industry since this point in time. Roof control electronics, gas monitoring, jumbo drill automation, remote and sensor- controlled continuous miners, automated trolley trucks, roof bolting and screening machines are examples of technology available today. The report concludes with recommendations as to six potential research areas. 25 refs.

  7. Ventilation of uranium mines

    International Nuclear Information System (INIS)

    Francois, Y.; Pradel, J.; Zettwoog, P.; Dumas, M.

    1975-01-01

    In the first part of the paper the authors describe the ventilation of French mines in terms of the primary ventilation system, which brings the outside air close to the working places using the overall structure of the mine to form the airways, and the secondary ventilation system, which is for the distribution of the primary air or for the ventilation of the development drifts and blind tunnels. Brief mention is made of the French regulations on the ventilation of mines in general and uranium mines in particular. The authors describe the equipment used and discuss the installed capacities and air flow per man and per working place. The difficulties encountered in properly ventilating various types of working places are mentioned, such as sublevel development drifts, reinforced stopes, and storage chambers with an artificial crown. The second part of the paper is devoted to computer calculations of the primary ventilation system. It is explained why the Commissariat a l'energie atomique has found it necessary to make these calculations. Without restating the mathematical theories underlying the methods employed, the authors demonstrate how simple measuring instruments and a small-size computer can be used to solve the ventilation problems arising in French mines. Emphasis is given to the layout of the ventilation system and to air flow and negative pressure measurements at the base of the mine. The authors show how calculations can be applied to new heading operations, a change in resistance, the replacement or addition of a ventilator, and a new air inlet or outlet. The authors come to the conclusion that since ventilation is at present the most reliable way of avoiding the pollution of mines, a thorough knowledge of the capabilities in this respect can often help improve working conditions. Despite the progress made, however, constant surveillance of the ventilation systems in uranium mines by a separate team with no responsibility for production problems is

  8. Mining with Rare Cases

    Science.gov (United States)

    Weiss, Gary M.

    Rare cases are often the most interesting cases. For example, in medical diagnosis one is typically interested in identifying relatively rare diseases, such as cancer, rather than more frequently occurring ones, such as the common cold. In this chapter we discuss the role of rare cases in Data Mining. Specific problems associated with mining rare cases are discussed, followed by a description of methods for addressing these problems.

  9. The modernisation of mining

    CSIR Research Space (South Africa)

    Ritchken, E

    2017-10-01

    Full Text Available mechanisms that will entrench the collaboration. The Phakisa had the task of developing collaborative solutions in response to the mining cluster challenges. • Operates through threat • Company focus • Objective is to comply • Company acts... in relative isolation. • Focus on ticking boxes • Focus on individual, easy to measure, projects of limited ambition • Funding through mining company balance sheet. • Creativity unlocked in finding loop- holes in compliance framework – does...

  10. Bauxite Mining Sustainably

    Science.gov (United States)

    Atkins, Patrick R.; Bayliss, Chris; Ward, Sam

    In 1990, the International Aluminum Institute began a program to report on the bauxite mining and rehabilitation activities of the worldwide industry. A survey process was initiated and reports were published in 1992, 2000 and 2004. The most recent report includes extensive data on mines representing over 70% of the world's output of bauxite and includes a more detailed focus on the social and economic as well as the environmental performance of the industry.

  11. International mining forum 2004, new technologies in underground mining, safety in mines proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Jerzy Kicki; Eugeniusz Sobczyk (eds.)

    2004-01-15

    The book comprises technical papers that were presented at the International Mining Forum 2004. This event aims to bring together scientists and engineers in mining, rock mechanics, and computer engineering, with a view to explore and discuss international developments in the field. Topics discussed in this book are: trends in the mining industry; new solutions and tendencies in underground mines; rock engineering problems in underground mines; utilization and exploitation of methane; prevention measures for the control of rock bursts in Polish mines; and current problems in Ukrainian coal mines.

  12. WEB STRUCTURE MINING

    Directory of Open Access Journals (Sweden)

    CLAUDIA ELENA DINUCĂ

    2011-01-01

    Full Text Available The World Wide Web became one of the most valuable resources for information retrievals and knowledge discoveries due to the permanent increasing of the amount of data available online. Taking into consideration the web dimension, the users get easily lost in the web’s rich hyper structure. Application of data mining methods is the right solution for knowledge discovery on the Web. The knowledge extracted from the Web can be used to raise the performances for Web information retrievals, question answering and Web based data warehousing. In this paper, I provide an introduction of Web mining categories and I focus on one of these categories: the Web structure mining. Web structure mining, one of three categories of web mining for data, is a tool used to identify the relationship between Web pages linked by information or direct link connection. It offers information about how different pages are linked together to form this huge web. Web Structure Mining finds hidden basic structures and uses hyperlinks for more web applications such as web search.

  13. Mine for sale

    International Nuclear Information System (INIS)

    Beer, G.

    2006-01-01

    The newest Slovak brown coal mine - Bana Zahorie is in crisis. Despite the fact that experts believe that along with Bana Novaky, it has the most potential. The owners have started its liquidation. One of the walls has collapsed and another part flooded. Nobody was hurt, but some equipment is still underground. The mine had already lost equipment in the past. During an accident in 2000, equipment worth several tens of millions was destroyed. 'After the accident, mining had to be stopped and from a technical point of view that was the end of the joint stock company, Bana Zahorie Cary. The company could not raise the funds necessary to recover from the accident,' stated the Director of the mine, Jan Palkovic. But he stressed that only the joint stock company is in liquidation, the mine is still being ventilated and the water is being pumped out. But the company management still does not want to specify who will become the new owner of the lignite deposits in Zahorie. The Director promised to publish more details within several weeks. All competencies and mining rights of the former Bana Zahorie are being transferred to a new company - joint stock company Bana Cary. (author)

  14. Mining in 2015

    Energy Technology Data Exchange (ETDEWEB)

    Hood, M.; Hatherly, P.; Gurgenci, H. [Centre for Mining Technology and Equipment (Australia)

    1999-10-01

    New technology in open-pit and underground hard rock mining in 2015 is anticipated in this article, based on a paper presented to the 1998 invitation symposium - 'Technology - Australia's future: new technology for traditional industry', held in Freemantle, WA, 24-25 November 1998. It is expected that essential mining operations of rock breakage and transport and ore processing will still exist but the use of drills, shovels/LHDs and trucks is likely to be replaced by continuous, intelligent, automated mining systems. Rock blasting models need to be fed data on rock properties at each blasthole for high accuracy. The authors believe that in 2015 measurements of rock properties will be a routine part of the drilling process. Blasthole drills will be fitted with a range of mechanical and geophysical sensors. New, non-explosive methods of rock breaking such as oscillating disc cutting, may be available. Mining automation will improve safety and productivity, perhaps with the automation of dragline swing LHDs and trucks may be able to drive themselves, with operators monitoring and intervening when necessary. Performance and machine condition data may be applied to improve equipment design. Australian mining stands to gain by these advances in mining technology. 1 fig., 3 photos.

  15. Sustainable mining management

    International Nuclear Information System (INIS)

    Tejera Oliver, J. L.

    2009-01-01

    Mining activities are carried out by the older man and have provided resources, since ancient times, for their development and progress. With the discovery of fire will show the first metals that have marked the civilizations of copper, bronze and iron, and is the prehistory of the Stone Age tools that man has made from the exploitation of quarries first. The industrial revolution of the nineteenth century is linked to coal and steel, and could not conceiver of todays society without oil and gas, without silicon and coltan. But the mines are often aggressive and, despite their need and what they contribute to the development are answered by the societies where are made. during recent years there has been growing international efforts to try to make the minimum requirements of sustainable exploitation (European Directives, GMI, GRI, etc.) In AENOR, and within the Technical Committee of Standardization 22 Mining and Explosives, chaired by AITEMIN, was established the subcommittee 3, chaired by IGME, where, with the participation of all stake holders, have developed some standards on sustainable mining management sustainable mining that will be a tool available to mining companies to demonstrate their sustainable use to Society. (Author)

  16. Fertility preservation in Turner syndrome.

    Science.gov (United States)

    Grynberg, Michaël; Bidet, Maud; Benard, Julie; Poulain, Marine; Sonigo, Charlotte; Cédrin-Durnerin, Isabelle; Polak, Michel

    2016-01-01

    Premature ovarian insufficiency is a relatively rare condition that can appear early in life. In a non-negligible number of cases the ovarian dysfunction results from genetic diseases. Turner syndrome (TS), the most common sex chromosome abnormality in females, is associated with an inevitable premature exhaustion of the follicular stockpile. The possible or probable infertility is a major concern for TS patients and their parents, and physicians are often asked about possible options to preserve fertility. Unfortunately, there are no recommendations on fertility preservation in this group. The severely reduced follicle pool even during prepubertal life represents the major limit for fertility preservation and is the root of numerous questions regarding the competence of gametes or ovarian tissue crybanked. In addition, patients suffering from TS show higher than usual rates of spontaneous abortion, fetal anomaly, and maternal morbidity and mortality, which should be considered at the time of fertility preservation and before reutilization of the cryopreserved gametes. Apart from fulfillment of the desire of becoming genetic parents, TS patients may be potential candidates for egg donation, gestational surrogacy, and adoption. The present review discusses the different options for preserving female fertility in TS and the ethical questions raised by these approaches. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  17. A privacy-preserving sharing method of electricity usage using self-organizing map

    Directory of Open Access Journals (Sweden)

    Yuichi Nakamura

    2018-03-01

    Full Text Available Smart meters for measuring electricity usage are expected in electricity usage management. Although the relevant power supplier stores the measured data, the data are worth sharing among power suppliers because the entire data of a city will be required to control the regional grid stability or demand–supply balance. Even though many techniques and methods of privacy-preserving data mining have been studied to share data while preserving data privacy, a study on sharing electricity usage data is still lacking. In this paper, we propose a sharing method of electricity usage while preserving data privacy using a self-organizing map. Keywords: Privacy preserving, Data sharing, Self-Organizing map

  18. Preservation theorems on finite structures

    International Nuclear Information System (INIS)

    Hebert, M.

    1994-09-01

    This paper concerns classical Preservation results applied to finite structures. We consider binary relations for which a strong form of preservation theorem (called strong interpolation) exists in the usual case. This includes most classical cases: embeddings, extensions, homomorphisms into and onto, sandwiches, etc. We establish necessary and sufficient syntactic conditions for the preservation theorems for sentences and for theories to hold in the restricted context of finite structures. We deduce that for all relations above, the restricted theorem for theories hold provided the language is finite. For the sentences the restricted version fails in most cases; in fact the ''homomorphism into'' case seems to be the only possible one, but the efforts to show that have failed. We hope our results may help to solve this frustrating problem; in the meantime, they are used to put a lower bound on the level of complexity of potential counterexamples. (author). 8 refs

  19. Blogs as Objects of Preservation

    DEFF Research Database (Denmark)

    Stepanyan, Karen; Gkotsis, George; Kalb, Hendrik

    2012-01-01

    challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building on the exist......challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building...... analysis) and, subsequently, improve the final reformulation of the properties. To demonstrate the applicability of the modified framework, the paper presents a use case of a blog preservation initiative that is informed by stakeholder interviews and evaluation of structural and technological foundations...

  20. Arsenic associated with historical gold mining in the Sierra Nevada foothills: Case study and field trip guide for Empire Mine State Historic Park, California

    Science.gov (United States)

    Alpers, Charles N.; Myers, Perry A; Millsap, Daniel; Regnier, Tamsen B; Bowell, Robert J.; Alpers, Charles N.; Jamieson, Heather E.; Nordstrom, D. Kirk; Majzlan, Juraj

    2014-01-01

    The Empire Mine, together with other mines in the Grass Valley mining district, produced at least 21.3 million troy ounces (663 tonnes) of gold (Au) during the 1850s through the 1950s, making it the most productive hardrock Au mining district in California history (Clark 1970). The Empire Mine State Historic Park (Empire Mine SHP or EMSHP), established in 1975, provides the public with an opportunity to see many well-preserved features of the historic mining and mineral processing operations (CDPR 2014a).A legacy of Au mining at Empire Mine and elsewhere is contamination of mine wastes and associated soils, surface waters, and groundwaters with arsenic (As), mercury (Hg), lead (Pb), and other metals. At EMSHP, As has been the principal contaminant of concern and the focus of extensive remediation efforts over the past several years by the State of California, Department of Parks and Recreation (DPR) and Newmont USA, Ltd. In addition, the site is the main focus of a multidisciplinary research project on As bioavailability and bioaccessibility led by the California Department of Toxic Substances Control (DTSC) and funded by the U.S. Environmental Protection Agency’s (USEPA’s) Brownfields Program.This chapter was prepared as a guide for a field trip to EMSHP held on June 14, 2014, in conjunction with a short course on “Environmental Geochemistry, Mineralogy, and Microbiology of Arsenic” held in Nevada City, California on June 15–16, 2014. This guide contains background information on geological setting, mining history, and environmental history at EMSHP and other historical Au mining districts in the Sierra Nevada, followed by descriptions of the field trip stops.

  1. Active preservation - otherwise no archives

    International Nuclear Information System (INIS)

    Norberg, E.

    1996-01-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed

  2. Yeasts preservation: alternatives for lyophilisation

    OpenAIRE

    Nyanga, Loveness K.; Nout, Martinus J. R.; Smid, Eddy J.; Boekhout, Teun; Zwietering, Marcel H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts during 6 months storage at 4 and 25 °C. None of the yeast cultures showed a significant loss in viable cell count during 6 months of storage at 4 °C upon lyophilisation and preservation in dry rice cak...

  3. Polarization-preserving holey fibers

    DEFF Research Database (Denmark)

    Broeng, Jes; Mogilevtsev, Dmitri; Libori, Stig E. Barkou

    2001-01-01

    In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization......In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization...

  4. Active preservation - otherwise no archives

    Energy Technology Data Exchange (ETDEWEB)

    Norberg, E [National Swedish Archives, Stockholm (Sweden)

    1996-12-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed.

  5. 36 CFR 910.32 - Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Historic preservation. 910.32... DEVELOPMENT AREA Standards Uniformly Applicable to the Development Area § 910.32 Historic preservation... Preservation Plan of the Corporation, are specified for preservation, shall be acomplished (a) in accordance...

  6. ACHP | Summary of the Preserve America Initiative

    Science.gov (United States)

    Initiative Preserve America: Explore and Enjoy Our Heritage (logo) Summary of the Preserve America Initiative Preserve America is a White House initiative that encourages and supports community efforts to preserve and enjoy our priceless cultural and natural heritage. The goals of the initiative include a greater shared

  7. Comparison of Tissue Preservation using Formalin and Ethanol as Preservative Formula

    OpenAIRE

    See Woan Shian; Arifin Soenggono; Sawkar Vijay Pramod

    2016-01-01

    Background: Tissue preservation can be performed through embalming, by providing the chemical embalming fluid to the human remains. Formalin’s preservative formula is the foundation for modern methods of embalming. Unfortunately, this preservative formula has several disadvantages. While Ethanol’s preservative formula is a considerable agent to replace formalin’s preservative formula. The aim of this study was to compare the tissue preservation using formalin and ethanol as preservative formu...

  8. Soil physical properties of high mountain fields under bauxite mining

    Directory of Open Access Journals (Sweden)

    Dalmo Arantes de Barros

    2013-10-01

    Full Text Available Mining contributes to the life quality of contemporary society, but can generate significant impacts, these being mitigated due to environmental controls adopted. This study aimed to characterize soil physical properties in high-altitude areas affected by bauxite mining, and to edaphic factors responses to restoration techniques used to recover mined areas in Poços de Caldas plateau, MG, Brazil. The experiment used 3 randomized block design involving within 2 treatments (before mining intervention and after environmental recovery, and 4 replicates (N=24. In each treatment, soil samples with deformed structures were determined: granulometry, water-dispersible clay content, flocculation index, particle density, stoniness level, water aggregate stability, and organic matter contend. Soil samples with preserved structures were used to determine soil density and the total volume of pores, macropores, and micropores. Homogenization of stoniness between soil layers as a result of soil mobilization was observed after the mined area recovery. Stoniness decreased in 0.10-0.20 m layer after recovery, but was similar in the 0-0.10 m layer in before and after samples. The recovery techniques restored organic matter levels to pre-mining levels. However, changes in soil, including an increase in soil flocculation degree and a decrease in water-dispersible clays, were still apparent post-recovery. Furthermore, mining operations caused structural changes to the superficial layer of soil, as demonstrated by an increase in soil density and a decrease in total porosity and macroporosity. Decreases in the water stability of aggregates were observed after mining operations.

  9. Data mining in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ruxandra-Ştefania PETRE

    2012-10-01

    Full Text Available This paper describes how data mining is used in cloud computing. Data Mining is used for extracting potentially useful information from raw data. The integration of data mining techniques into normal day-to-day activities has become common place. Every day people are confronted with targeted advertising, and data mining techniques help businesses to become more efficient by reducing costs.Data mining techniques and applications are very much needed in the cloud computing paradigm. The implementation of data mining techniques through Cloud computing will allow the users to retrieve meaningful information from virtually integrated data warehouse that reduces the costs of infrastructure and storage.

  10. Methane emissions from coal mining

    International Nuclear Information System (INIS)

    Boyer, C.M.; Kelafant, J.R.; Kuuskraa, V.A.; Manger, K.C.; Kruger, D.

    1990-09-01

    The report estimates global methane emissions from coal mining on a country specific basis, evaluates the technologies available to degasify coal seams and assesses the economics of recovering methane liberated during mining. 33 to 64 million tonnes were liberated in 1987 from coal mining, 75 per cent of which came from China, the USSR, Poland and the USA. Methane emissions from coal mining are likely to increase. Emission levels vary between surface and underground mines. The methane currently removed from underground mines for safety reasons could be used in a number of ways, which may be economically attractive. 55 refs., 19 figs., 24 tabs

  11. Randomization Based Privacy Preserving Categorical Data Analysis

    Science.gov (United States)

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  12. Local quantum channels preserving classical correlations

    International Nuclear Information System (INIS)

    Guo Zhihua; Cao Huaixin

    2013-01-01

    The aim of this paper is to discuss local quantum channels that preserve classical correlations. First, we give two equivalent characterizations of classical correlated states. Then we obtain the relationships among classical correlation-preserving local quantum channels, commutativity-preserving local quantum channels and commutativity-preserving quantum channels on each subsystem. Furthermore, for a two-qubit system, we show the general form of classical correlation-preserving local quantum channels. (paper)

  13. Land Use and River Degradation Impact of Sand and Gravel Mining

    Science.gov (United States)

    Syah, Putra Rizal Ichsan; Hartuti, Purnaweni

    2018-02-01

    Sand and gravel mining is aimed at providing materials for infrastructure development, as well as providing economical source to the miners. However, the impacts of sand and gravel mining could also cause disturbances to ecological balance, since it is closely related to land use change and river degradation, besides causing conflicts in the miners, the government, and the private relationship. Therefore the government regulation and proper supervision are needed to preserve the ecological balance and decreasing the negative impacts of this mining, and therefore guarantee sustainable development.

  14. A revolution in food preservation

    International Nuclear Information System (INIS)

    1986-01-01

    A brief consumer guide to food irradiation is presented. Aspects covered include some of the advantages of food irradiation compared to other methods of food preservation, the type of radiation used, the mechanism of action, some practical applications, safety and future benefits. (UK)

  15. Hardcore Heritage: imagination for preservation

    NARCIS (Netherlands)

    Rietveld, E.; Rietveld, R.

    2017-01-01

    Should the practice of the historic preservation of built and landscape heritage necessarily be based on conservation? Monuments, listed buildings, landscapes, and other forms of built heritage, are typically regarded as immutable and untouchable—objects to be “conserved”—and as a result tend to

  16. 2007 Preserve America Presidential Awards

    Science.gov (United States)

    aviation history museum that emphasizes people and culture as well as technology and events. With a the Private Preservation category, the two winners are: The History Channel, Save Our History Save Our History were Abbe Raven, president and CEO, A&E Television Networks; and Nancy Dubuc

  17. Yeasts preservation: alternatives for lyophilisation

    NARCIS (Netherlands)

    Nyanga, L.K.; Nout, M.J.R.; Smid, E.J.; Boekhout, T.; Zwietering, M.H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts

  18. Beyond the Scope of Preservation?

    DEFF Research Database (Denmark)

    Rikke, Stenbro,; Riesto, Svava

    2014-01-01

    Why are some parts of the built environment protected as national heritage and others not? Listing is the most restrictive tool of Norwegian and Danish preservation in the built environment and creates a specific version of the past told through buildings and sites. The heritage authorities in both...

  19. Study of the distribution patterns of the constituent herbs in classical Chinese medicine prescriptions treating respiratory disease by data mining methods.

    Science.gov (United States)

    Fu, Xian-Jun; Song, Xu-Xia; Wei, Lin-Bo; Wang, Zhen-Guo

    2013-08-01

    To provide the distribution pattern and compatibility laws of the constituent herbs in prescriptions, for doctor's convenience to make decision in choosing correct herbs and prescriptions for treating respiratory disease. Classical prescriptions treating respiratory disease were selected from authoritative prescription books. Data mining methods (frequent itemsets and association rules) were used to analyze the regular patterns and compatibility laws of the constituent herbs in the selected prescriptions. A total of 562 prescriptions were selected to be studied. The result exhibited that, Radix glycyrrhizae was the most frequently used in 47.2% prescriptions, other frequently used were Semen armeniacae amarum, Fructus schisandrae Chinese, Herba ephedrae, and Radix ginseng. Herbal ephedrae was always coupled with Semen armeniacae amarum with the confidence of 73.3%, and many herbs were always accompanied by Radix glycyrrhizae with high confidence. More over, Fructus schisandrae Chinese, Herba ephedrae and Rhizoma pinelliae was most commonly used to treat cough, dyspnoea and associated sputum respectively besides Radix glycyrrhizae and Semen armeniacae amarum. The prescriptions treating dyspnoea often used double herb group of Herba ephedrae & Radix glycyrrhizae, while prescriptions treating sputum often used double herb group of Rhizoma pinelliae & Radix glycyrrhizae and Rhizoma pinelliae & Semen armeniacae amarum, triple herb groups of Rhizoma pinelliae & Semen armeniacae amarum & Radix glycyrrhizae and Pericarpium citri reticulatae & Rhizoma pinelliae & Radix glycyrrhizae. The prescriptions treating respiratory disease showed common compatibility laws in using herbs and special compatibility laws for treating different respiratory symptoms. These principle patterns and special compatibility laws reported here could be useful for doctors to choose correct herbs and prescriptions in treating respiratory disease.

  20. Using the Personal Health Train for Automated and Privacy-Preserving Analytics on Vertically Partitioned Data.

    Science.gov (United States)

    van Soest, Johan; Sun, Chang; Mussmann, Ole; Puts, Marco; van den Berg, Bob; Malic, Alexander; van Oppen, Claudia; Towend, David; Dekker, Andre; Dumontier, Michel

    2018-01-01

    Conventional data mining algorithms are unable to satisfy the current requirements on analyzing big data in some fields such as medicine, policy making, judicial, and tax records. However, applying diverse datasets from different institutes (both healthcare and non-healthcare related) can enrich information and insights. So far, analyzing this data in an automated, privacy-preserving manner does not exist to our knowledge. In this work, we propose an infrastructure, and proof-of-concept for privacy-preserving analytics on vertically partitioned data.

  1. Colombia, mining country. Vision a year 2019

    International Nuclear Information System (INIS)

    2006-01-01

    Scope of the state action for the mining sector, the performance of the mining sector, regional perceptions of mining development, construction of a long-term vision for the mining sector, the action plan and goals follow-up

  2. Safety Research and Experimental Coal Mines

    Data.gov (United States)

    Federal Laboratory Consortium — Safety Research and Experimental Coal MinesLocation: Pittsburgh SiteThe Safety Research Coal Mine and Experimental Mine complex is a multi-purpose underground mine...

  3. [Features of health disorders in miners employed at northern copper-nickel mines].

    Science.gov (United States)

    Siurin, S V; Shilov, V V

    2016-01-01

    The aim of the study was to assess the influence of different working conditions on the health of 1523 copper-nickel miners of the Kola High North. The low degree of mechanization of mining operations was established to be related to more higher levels of vibration, noise and physical overloads. The working in such conditions, when compared with high mining mechanization, leads to a decrease in the number of conditionally healthy workers (12% and 20.7%, p mining operations the greatest risk of occupational diseases in noted in drifters (OR = 5.68), at that it was higher at hand mining than at mechanized mining (RR = 1.44). There was made a conclusion about the need to improve the complex of measures for the preservation of health in this group of workers, especially engaged in the performance of tunnel works.

  4. Hybrid Food Preservation Program Improves Food Preservation and Food Safety Knowledge

    Science.gov (United States)

    Francis, Sarah L.

    2014-01-01

    The growing trend in home food preservation raises concerns about whether the resulting food products will be safe to eat. The increased public demand for food preservation information led to the development of the comprehensive food preservation program, Preserve the Taste of Summer (PTTS). PTTS is a comprehensive hybrid food preservation program…

  5. Mining in Australia

    Energy Technology Data Exchange (ETDEWEB)

    Shimada, S

    1986-01-01

    Statistics are given on: 1) Australian dependence on imported raw materials in 1980; 2) production levels in the different mining fields in 1981; 3) trends in the production of minerals over the years 1961-1981. The role of the mining industry in the Australian economy is outlined, and brief details given of its structure. Further statistics are given regarding trends in the production of coal, iron, salt, lead and zinc during the period 1961-1981, together with details of the number of people employed in these industries. Operations at some of the principal mines (coal, iron ore and salt) are outlined and 1983 production figures for all mineral resources are given. 18 refs., 21 figs., 5 tabs.

  6. Mining and the environment

    International Nuclear Information System (INIS)

    Janecka, V.; Nemec, V.; Bradka, S.; Placek, V.; Sulovsky, P.

    1992-01-01

    The proceedings contain 30 contributions, out of which 9 have been inputted in INIS. They are concerned with uranium mines and mills in the Czech Republic. The impacts of the mining activities and of the mill tailings on the environment and the population are assessed, and it is concluded that the radiation hazard does not exceed that from natural background. Considerable attention is paid to the monitoring of the surroundings of mines and mills and to landscaping activities. Proposed technologies for the purification of waste waters from the chemical leaching process are described. Ways to eliminate environmental damage from abandoned tailings settling ponds are suggested. (M.D.). 18 tabs., 21 figs., 43 refs

  7. Data mining methods

    CERN Document Server

    Chattamvelli, Rajan

    2015-01-01

    DATA MINING METHODS, Second Edition discusses both theoretical foundation and practical applications of datamining in a web field including banking, e-commerce, medicine, engineering and management. This book starts byintroducing data and information, basic data type, data category and applications of data mining. The second chapterbriefly reviews data visualization technology and importance in data mining. Fundamentals of probability and statisticsare discussed in chapter 3, and novel algorithm for sample covariants are derived. The next two chapters give an indepthand useful discussion of data warehousing and OLAP. Decision trees are clearly explained and a new tabularmethod for decision tree building is discussed. The chapter on association rules discusses popular algorithms andcompares various algorithms in summary table form. An interesting application of genetic algorithm is introduced inthe next chapter. Foundations of neural networks are built from scratch and the back propagation algorithm is derived...

  8. Auxiliary mine ventilation manual

    International Nuclear Information System (INIS)

    Workplace Safety North

    2010-01-01

    An adequate ventilation system is needed for air quality and handling in a mine and is comprised of many different pieces of equipment for removing contaminated air and supplying fresh air and thereby provide a satisfactory working environment. This manual highlights auxiliary ventilation systems made up of small fans, ducts, tubes, air movers, deflectors and additional air flow controls which distribute fresh air delivered by the primary system to all areas. A review of auxiliary ventilation is provided. Design, operation and management issues are discussed and guidelines are furnished. This manual is limited to underground hard rock operations and does not address directly other, specific auxiliary systems, either in underground coal mines or uranium mines.

  9. Auxiliary mine ventilation manual

    Energy Technology Data Exchange (ETDEWEB)

    Workplace Safety North

    2010-07-01

    An adequate ventilation system is needed for air quality and handling in a mine and is comprised of many different pieces of equipment for removing contaminated air and supplying fresh air and thereby provide a satisfactory working environment. This manual highlights auxiliary ventilation systems made up of small fans, ducts, tubes, air movers, deflectors and additional air flow controls which distribute fresh air delivered by the primary system to all areas. A review of auxiliary ventilation is provided. Design, operation and management issues are discussed and guidelines are furnished. This manual is limited to underground hard rock operations and does not address directly other, specific auxiliary systems, either in underground coal mines or uranium mines.

  10. Worldwide ISL Uranium Mining Outlook

    International Nuclear Information System (INIS)

    Boytsov, A.; Stander, S.; Martynenko, V.

    2014-01-01

    Contents: • ISL uranium production historical review and current status; • ISL versus conventional mining; • Acid versus alkaline ISL; • ISL cost considerations; • Principal criteria and parameters for ISL mining; • ISL production forecast and resources availability

  11. The South African mining industry

    International Nuclear Information System (INIS)

    Langton, G.

    1982-01-01

    This paper covers six of the many mining and associated developments in South Africa. These are: (1) Deep level gold mining at Western Deep Levels Limited - (2) Palabora Mining Company Limited - SA's unique copper mine - (3) Production of steel and vanadium-rich slag at Highveld Steel and Vanadium Corporation - (4) Coal mining at Kriel and Kleinkopje Collieries - (5) A mass mining system for use below the Gabbro Sill at Premier Diamond Mine - (6) Uranium production - joint metallurgical scheme- Orange Free State Gold Mines. - For publication in this journal the original paper has been summarised. Should any reader wish to have the full text in English he should write to the author at the address below. (orig.) [de

  12. Construction over abandoned mine workings

    Energy Technology Data Exchange (ETDEWEB)

    Healy, P R; Head, J M

    1984-01-01

    Guidance is given for engineers involved with the planning and development of sites previously undermined for coal and other minerals. Past methods of mining employed in Britain are described, and their short- and long-term effects on surface stability are assessed. Where modern methods of mining are relevant, or where structural design techniques for the surface effects of mining can be applied, these are included for illustration and completeness. Additional objectives over and above those for conventional site investigations are identified, and details are provided for the planning and execution of a mining investigation. Techniques for consolidation of old mine workings and remedial measures for mine shafts are described. Foundation design options are included for cases where expected ground movements can be accommodated. A comprehensive guide to sources of information on previous mining is presented, together with an example of a specification suitable for the consolidation of old shallow mine workings. (50 refs.)

  13. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  14. Personal continuous route pattern mining

    Institute of Scientific and Technical Information of China (English)

    Qian YE; Ling CHEN; Gen-cai CHEN

    2009-01-01

    In the daily life, people often repeat regular routes in certain periods. In this paper, a mining system is developed to find the continuous route patterns of personal past trips. In order to count the diversity of personal moving status, the mining system employs the adaptive GPS data recording and five data filters to guarantee the clean trips data. The mining system uses a client/server architecture to protect personal privacy and to reduce the computational load. The server conducts the main mining procedure but with insufficient information to recover real personal routes. In order to improve the scalability of sequential pattern mining, a novel pattern mining algorithm, continuous route pattern mining (CRPM), is proposed. This algorithm can tolerate the different disturbances in real routes and extract the frequent patterns. Experimental results based on nine persons' trips show that CRPM can extract more than two times longer route patterns than the traditional route pattern mining algorithms.

  15. Using blocking approach to preserve privacy in classification rules by inserting dummy Transaction

    Directory of Open Access Journals (Sweden)

    Doryaneh Hossien Afshari

    2017-03-01

    Full Text Available The increasing rate of data sharing among organizations could maximize the risk of leaking sensitive knowledge. Trying to solve this problem leads to increase the importance of privacy preserving within the process of data sharing. In this study is focused on privacy preserving in classification rules mining as a technique of data mining. We propose a blocking algorithm to hiding sensitive classification rules. In the solution, rules' hiding occurs as a result of editing a set of transactions which satisfy sensitive classification rules. The proposed approach tries to deceive and block adversaries by inserting some dummy transactions. Finally, the solution has been evaluated and compared with other available solutions. Results show that limiting the number of attributes existing in each sensitive rule will lead to a decrease in both the number of lost rules and the production rate of ghost rules.

  16. Mining robotics sensors

    CSIR Research Space (South Africa)

    Green, JJ

    2011-07-01

    Full Text Available International Conference of CAD/CAM, Robotics & Factories of the Future (CARs&FOF 2011) 26-28 July 2-11, Kuala Lumpur, Malaysia Mining Robotics Sensors Perception Sensors on a Mine Safety Platform Green JJ1, Hlophe K2, Dickens J3, Teleka R4, Mathew Price5...-28 July 2-11, Kuala Lumpur, Malaysia visualization in confined, lightless environments, and thermography for assessing the safety and stability of hanging walls. Over the last decade approximately 200 miners have lost their lives per year in South...

  17. Novel mining methods

    CSIR Research Space (South Africa)

    Monchusi, B

    2012-10-01

    Full Text Available stream_source_info Monchusi_2012.pdf.txt stream_content_type text/plain stream_size 1953 Content-Encoding ISO-8859-1 stream_name Monchusi_2012.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Novel Mining Methods 4th... 2012 Slide 12 CSIR mine safety platform AR Drone Differential time-of-flight beacon Sampling ? CSIR 2012 Slide 13 Reef Laser-Induced Breakdown Spectroscopy (LIBS) head Scan X-Y Laser/Spectrometer/Computer Rock Breaking ? CSIR 2012 Slide...

  18. Data mining for dummies

    CERN Document Server

    Brown, Meta S

    2014-01-01

    Delve into your data for the key to success Data mining is quickly becoming integral to creating value and business momentum. The ability to detect unseen patterns hidden in the numbers exhaustively generated by day-to-day operations allows savvy decision-makers to exploit every tool at their disposal in the pursuit of better business. By creating models and testing whether patterns hold up, it is possible to discover new intelligence that could change your business''s entire paradigm for a more successful outcome. Data Mining for Dummies shows you why it doesn''t take a data scientist to gain

  19. Data mining mobile devices

    CERN Document Server

    Mena, Jesus

    2013-01-01

    With today's consumers spending more time on their mobiles than on their PCs, new methods of empirical stochastic modeling have emerged that can provide marketers with detailed information about the products, content, and services their customers desire.Data Mining Mobile Devices defines the collection of machine-sensed environmental data pertaining to human social behavior. It explains how the integration of data mining and machine learning can enable the modeling of conversation context, proximity sensing, and geospatial location throughout large communities of mobile users

  20. A STUDY OF TEXT MINING METHODS, APPLICATIONS,AND TECHNIQUES

    OpenAIRE

    R. Rajamani*1 & S. Saranya2

    2017-01-01

    Data mining is used to extract useful information from the large amount of data. It is used to implement and solve different types of research problems. The research related areas in data mining are text mining, web mining, image mining, sequential pattern mining, spatial mining, medical mining, multimedia mining, structure mining and graph mining. Text mining also referred to text of data mining, it is also called knowledge discovery in text (KDT) or knowledge of intelligent text analysis. T...

  1. Low-level efficacy of cosmetic preservatives

    DEFF Research Database (Denmark)

    Lundov, M D; Johansen, J D; Zachariae, C

    2011-01-01

    Preservation using combinations of preservatives has several advantages. This study shows that the concentration of some of the most frequently used allergenic preservatives can be markedly lowered when they are combined with phenoxyethanol. The antimicrobial efficacy of cosmetic preservatives...... of the preservatives indicated additive effects against the microorganisms. No combination of preservatives showed any inhibitory action on each other. Challenge tests with different concentrations and combinations were performed in a cosmetic cream. Diazolidinyl urea and MCI/MI alone were ineffective against C....... albicans in a challenge test at concentrations up to 16 times higher than the observed MIC values. When combining phenoxyethanol with either one of the allergenic preservatives diazolidinyl urea, MCI/MI or MI, the cosmetic cream was adequately preserved at concentrations well below the preservatives' MIC values as well...

  2. 30 CFR 77.1200 - Mine map.

    Science.gov (United States)

    2010-07-01

    ... SAFETY STANDARDS, SURFACE COAL MINES AND SURFACE WORK AREAS OF UNDERGROUND COAL MINES Maps § 77.1200 Mine...) The location of railroad tracks and public highways leading to the mine, and mine buildings of a permanent nature with identifying names shown; (k) Underground mine workings underlying and within 1,000...

  3. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    International Nuclear Information System (INIS)

    Zvi H. Meiksin

    2002-01-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system

  4. WIRELESS MINE WIDE TELECOMMUNICATIONS TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Zvi H. Meiksin

    2002-04-01

    Two industrial prototype units for through-the-earth wireless communication were constructed and tested. Preparation for a temporary installation in NIOSH's Lake Lynn mine for the through-the-earth and the in-mine system were completed. Progress was made in the programming of the in-mine system to provide data communication. Work has begun to implement a wireless interface between equipment controllers and our in-mine system.

  5. New mine projects, positive outlook

    Energy Technology Data Exchange (ETDEWEB)

    M. Cremer

    2006-12-15

    Speaking on the first day at the Mining 2006 Resources Convention the Deputy Director General, Mining and Petroleum gave an optimistic outlook for mining in 2007 based on the number of new projects under consideration or construction. The convention was held in early November in Brisbane, Queensland, Australia. 3 figs., 1 photo.

  6. Process mining : overview and opportunities

    NARCIS (Netherlands)

    Aalst, van der W.M.P.

    2012-01-01

    Over the last decade, process mining emerged as a new research ¿eld that focuses on the analysis of processes using event data. Classical data mining techniques such as classi¿cation, clustering, regression, association rule learning, and sequence/episode mining do not focus on business process

  7. Studies in frequent tree mining

    NARCIS (Netherlands)

    Knijf, De J.

    2008-01-01

    Employing Data mining techniques for structured data is particularly challenging, because it is commonly assumed that the structure of the data encodes part of its semantics. As a result are classical data mining techniques insufficient to analyze and mine these data. In this thesis we develop

  8. Review of South American mines

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    A general overview is presented of the mining activity and plans for South America. The countries which are presented are Columbia, Argentina, Brazil, Venezuela, Chile, Peru, and Bolivia. The products of the mines include coal, bauxite, gold, iron, uranium, copper and numerous other minor materials. A discussion of current production, support and processing facilities, and mining strategies is also given

  9. in remediating acid mine drainage

    African Journals Online (AJOL)

    The management and treatment of contaminated mine water is one of the most urgent problems facing the South African mining industry. The cost advantage of permeable reactive barriers (PRBs) has seen their increased application as means of passively treating mine drainage. A PRB is built by placing a reactive material ...

  10. A direction of developing a mining method and mining complexes

    Energy Technology Data Exchange (ETDEWEB)

    Gabov, V.V.; Efimov, I.A. [St. Petersburg State Mining Institute, St. Petersburg (Russian Federation). Vorkuta Branch

    1996-12-31

    The analyses of a mining method as a main factor determining the development stages of mining units is presented. The paper suggests a perspective mining method which differs from the known ones by following peculiarities: the direction selectivity of cuts with regard to coal seams structure; the cutting speed, thickness and succession of dusts. This method may be done by modulate complexes (a shield carrying a cutting head for coal mining), their mining devices being supplied with hydraulic drive. An experimental model of the module complex has been developed. 2 refs.

  11. Mining dictionary: underground mining; open-cast mining; preparation and beneficiation; geology of mineral deposits

    Energy Technology Data Exchange (ETDEWEB)

    Goergen, H; Stoll, R D; Vriesen, R D; Welzenberg, B

    1981-01-01

    The dictionary reflects the latest technical developments in the vocabulary of mining methods and the mining industry. Volume I of the dictionary is English to German, Volume II German to English. 36,000 entries are included.

  12. Orbital preservation in a maxillectomy

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi [Sapporo National Hospital (Japan)

    1999-07-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au{sup 198}) thus appeared to be a useful tool for further preserving the eye. (author)

  13. Orbital preservation in a maxillectomy

    International Nuclear Information System (INIS)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi

    1999-01-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au 198 ) thus appeared to be a useful tool for further preserving the eye. (author)

  14. INCORRECT PRESERVATION OF AMPUTATED DIGITS

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2004-09-01

    Full Text Available Background. A decision to replant is critically dependent on the condition of the amputated digit and the way it was preserved during transport. The most common error is exposing the amputated digit to very low temperatures. Preservation directly on ice, on cooling devices in portable refrigerators, or on top of packets of frozen meat often result in a frozen and therefore unusable body digit.Methods. An inquiry questionnaire on correct methods of preservation of amputated digits was conducted on a sample of 30 lay persons, 30 medical students, and 15 physicians.Three simulations of most frequently used methods of preservation of amputated digit were conducted (the correct method; directly on ice; on cooling devices of portable refrigerators. Environment temperature of the (simulated amputated digits stored was measured.In a retrospective study, hospital records of patients treated at the Clinical department of plastic surgery and burns in Ljubljana between 1998 and 2002 were examined. We determined the number of replantations performed, gender of the patients, their age, the mechanism of the injury, the success rate of the replantation, and the duration of hospitalisation. In five case described in detail, we present an inadequate treatment of the amputated digits.Results. The results of the questionnaire survey show that no less than 86.7% of lay person respondents would have treated the injuries in an incorrect way; same holds for 43.4% students of medicine, and 33.3% of practicing physicians.The temperature of the simulated amputated digit remained above 5°C throughout the simulated correct treatment. When preserved directly on ice on or coolant bodies, the temperature dropped below the freezing point and never climbed above 0°C throughout the duration of the simulation (150 minutes.Between years 1998 and 2002, Clinical department of plastic surgery and burns at the University clinical centre Ljubljana admitted 124 injured persons with

  15. Nuclear Knowledge Preservation in Croatia

    International Nuclear Information System (INIS)

    Pleslic, S.; Novosel, N.

    2006-01-01

    Since the International Atomic Energy Agency (IAEA, Vienna, Austria) was founded in 1957 as an autonomous intergovernmental organization, it was authorized for exchange of technical and scientific information on peaceful uses of atomic energy. 35 years ago the International Nuclear Information System (INIS) was established from IAEA as an international bibliographic database in the nuclear field and in nuclear related areas. INIS as an instrument for a comprehensive and systematic dissemination of all information and knowledge becomes a big technological and science information system with 134 Members (114 countries and 20 international organizations). In INIS Membership Arrangements all Members are responsible for the collection, selection, description of information and providing the Agency with the full text of each item of non-conventional literature. Participation of each Member is important because decentralized information management is an operational philosophy of INIS. During all these years status of nuclear power changed significantly in the world. Some developing countries started to develop nuclear power programme and some developed countries showed tendency to decrease use of nuclear power. Anyway, expert knowledge accumulated over decades and the achievements in the field of nuclear science and technology have to be preserved and later transferred to future generations. It became obvious that the INIS is practically a pioneer in the area of nuclear knowledge preservation with well defined goals of knowledge preservation: selection of the most valuable information to convey to the future, ensuring that it remains accessible, readable and understandable and management of technological change. Main components of knowledge preservation are: selection of information for preservation including evaluation and prioritisation by value, use and risk, information capture (purchasing, copy, digitise, web links), describing, classifying, store and access

  16. Preserved entropy and fragile magnetism.

    Science.gov (United States)

    Canfield, Paul C; Bud'ko, Sergey L

    2016-08-01

    A large swath of quantum critical and strongly correlated electron systems can be associated with the phenomena of preserved entropy and fragile magnetism. In this overview we present our thoughts and plans for the discovery and development of lanthanide and transition metal based, strongly correlated systems that are revealed by suppressed, fragile magnetism, quantum criticality, or grow out of preserved entropy. We will present and discuss current examples such as YbBiPt, YbAgGe, YbFe2Zn20, PrAg2In, BaFe2As2, CaFe2As2, LaCrSb3 and LaCrGe3 as part of our motivation and to provide illustrative examples.

  17. Preservation of food and radiation

    International Nuclear Information System (INIS)

    Kasamatsu, Tomomichi

    1975-01-01

    In the application of radiation to preservation of food, there are some methods; sterilization, elimination of noxious insects, prevention of germination and control of maturation. The former two utilize the lethal effect of radiation to the living things and the latter two utilize the injurious effect on the metabolism of the living things. At present, irradiation to potato is most widely permitted for the purpose of prevention of germination, and the irradiation with 15 Krad (maximum) is allowed to preserve potato for 8 months in Japan. In the other hand, a large quantity of doses, such as 4.5 to 5.6 Mrad, is necessary to sterilize completely for industrial use, degeneration of food component and high cost come into question. In addition, food is directly taken into the mouth of human being, therefore, wholesomeness, legal permission and determination of dose must be examined. (Tsukamoto, Y.)

  18. Food Preservation by Irradiation (Rev.)

    Energy Technology Data Exchange (ETDEWEB)

    Urrows, Grace M.

    1968-01-01

    Up to 30% of food harvests are lost in some parts of the world because of animal pests and microorganisms. Nuclear techniques can help reduce and extend the shelf life of these foods. Around 55 countries now have food irradiation programs. The use of radiation is the most recent step in man's attempts to preserve some of his harvest for the lean part of the year.

  19. Technical Information/Website Preservation

    Science.gov (United States)

    PintoRey, Christian R.

    2010-01-01

    This document reviews the work of the author in NASA's Motivating Undergraduates in Science and Technology (MUST) internship. The intern worked on the Space Shuttles hydraulic systems (i.e., Auxiliary Power Units (APU's) and Hydraulic Pump Units (HPU's)), and website preservation of the hydraulic technology captured in websites relating to the coming.the Space Shuttle Retirement. Several figures and pictures show an overview of the orbiter's hydraulic systems

  20. New method of preserving food

    Energy Technology Data Exchange (ETDEWEB)

    Carrard, G. (Australian Atomic Energy Commission Research Establishment, Lucas Heights)

    1983-07-01

    The use of gamma radiation for food preservation is discussed. Investigations at the AAEC include: the eradication of fruit-fly larvae in oranges, tomatoes and avocadoes; treatment of shrimps; extending the shelf life of mushrooms and potatoes; treatment of imported beans to prevent germination; killing of bacterial spores with a combination of pressure and gamma radiation; and the treatment of beehives containing honey-bee larvae with foulbrood.

  1. New method of preserving food

    International Nuclear Information System (INIS)

    Carrard, G.

    1983-01-01

    The use of gamma radiation for food preservation is discussed. Investigations at the AAEC include: the eradication of fruit-fly larvae in oranges, tomatoes and avocadoes; treatment of shrimps; extending the shelf life of mushrooms and potatoes; treatment of imported beans to prevent germination; killing of bacterial spores with a combination of pressure and gamma radiation; and the treatment of beehives containing honey-bee larvae with foulbrood

  2. ULTRAVIOLET TECHNOLOGY FOR FOOD PRESERVATION

    OpenAIRE

    Guedes, AMM; Novello, D; Mendes, GMD; Cristianini, M

    2009-01-01

    ULTRAVIOLET TECHNOLOGY FOR FOOD PRESERVATION This literature review article had as objective to gather information about ultraviolet (UV) technology utilization on the food industry, its effects and potential application. Aspects as the origin, concept and applications of the technology on the equipment industry and running mechanisms were approached. The application of UV radiation on food decontamination is still little used due its low penetration, but it is known that it can be easily app...

  3. 75 FR 17529 - High-Voltage Continuous Mining Machine Standard for Underground Coal Mines

    Science.gov (United States)

    2010-04-06

    ... High-Voltage Continuous Mining Machine Standard for Underground Coal Mines AGENCY: Mine Safety and... of high-voltage continuous mining machines in underground coal mines. It also revises MSHA's design...-- Underground Coal Mines III. Section-by-Section Analysis A. Part 18--Electric Motor-Driven Mine Equipment and...

  4. Internet technologies in the mining industry. Towards unattended mining systems

    Energy Technology Data Exchange (ETDEWEB)

    Krzykawski, Michal [FAMUR Group, Katowice (Poland)

    2009-08-27

    Global suppliers of longwall systems focus mainly on maximising the efficiency of the equipment they manufacture. Given the fact that, since 2004, coal demand on world markets has been constantly on the increase, even during an economic downturn, this endeavour seems fully justified. However, it should be remembered that maximum efficiency must be accompanied by maximum safety of all underground operations. This statement is based on the belief that the mining industry, which exploits increasingly deep and dangerous coal beds, faces the necessity to implement comprehensive IT systems for managing all mining processes and, in the near future, to use unmanned mining systems, fully controllable from the mine surface. The computerisation of mines is an indispensable element of the development of the world mining industry, a belief which has been put into practice with e-mine, developed by the FAMUR Group. (orig.)

  5. Mining Together : Large-Scale Mining Meets Artisanal Mining, A Guide for Action

    OpenAIRE

    World Bank

    2009-01-01

    The present guide mining together-when large-scale mining meets artisanal mining is an important step to better understanding the conflict dynamics and underlying issues between large-scale and small-scale mining. This guide for action not only points to some of the challenges that both parties need to deal with in order to build a more constructive relationship, but most importantly it sh...

  6. The ZEUS data preservation project

    International Nuclear Information System (INIS)

    Malka, Janusz; Wichmann, Katarzyna

    2012-01-01

    A project to allow long term access and physics analysis of ZEUS data (ZEUS data preservation) has been established in collaboration with the DESY-IT group. In the ZEUS approach the analysis model is based on the Common Ntuple project, under development since 2006. The real data and all presently available Monte Carlo samples are being preserved in a flat ROOT ntuple format. There is ongoing work to provide the ability to simulate new, additional Monte Carlo samples also in the future. The validation framework of such a scheme using virtualisation techniques is being explored. The goal is to validate the frozen ZEUS software against future changes in hardware and operating system. A cooperation between ZEUS, DESY-IT and the library was established for document digitisation and long-term preservation of collaboration web pages. Part of the ZEUS internal documentation has already been stored within the HEP documentation system INSPIRE. Existing digital documentation, needed to perform physics analysis also in the future, is being centralised and completed.

  7. Phase-preserved optical elevator.

    Science.gov (United States)

    Luo, Yuan; Zhang, Baile; Han, Tiancheng; Chen, Zhi; Duan, Yubo; Chu, Chia-Wei; Barbastathis, George; Qiu, Cheng Wei

    2013-03-25

    The unique superiority of transformation optics devices designed from coordinate transformation is their capability of recovering both ray trajectory and optical path length in light manipulation. However, very few experiments have been done so far to verify this dual-recovery property from viewpoints of both ray trajectory and optical path length simultaneously. The experimental difficulties arise from the fact that most previous optical transformation optics devices only work at the nano-scale; the lack of intercomparison between data from both optical path length and ray trajectory measurement in these experiments obscured the fact that the ray path was subject to a subwavelength lateral shift that was otherwise not easily perceivable and, instead, was pointed out theoretically [B. Zhang et al. Phys. Rev. Lett. 104, 233903, 2010]. Here, we use a simple macroscopic transformation optics device of phase-preserved optical elevator, which is a typical birefringent optical phenomenon that can virtually lift an optical image by a macroscopic distance, to demonstrate decisively the unique optical path length preservation property of transformation optics. The recovery of ray trajectory is first determined with no lateral shift in the reflected ray. The phase preservation is then verified with incoherent white-light interferometry without ambiguity and phase unwrapping.

  8. Mining frequent binary expressions

    NARCIS (Netherlands)

    Calders, T.; Paredaens, J.; Kambayashi, Y.; Mohania, M.K.; Tjoa, A.M.

    2000-01-01

    In data mining, searching for frequent patterns is a common basic operation. It forms the basis of many interesting decision support processes. In this paper we present a new type of patterns, binary expressions. Based on the properties of a specified binary test, such as reflexivity, transitivity

  9. From mine to meadow

    Energy Technology Data Exchange (ETDEWEB)

    Gualdron, R; Camacho, R [Intercor, Barranquilla (Colombia). Environmental Engineering Division

    1993-10-01

    This article describes the rehabilitation of dumps and backfill areas at the world's largest export coal mine, El Cerrejon Zone Norte, in Northern Colombia. The rehabilitation process includes the preparation of surfaces and slopes, the placement of topsoil and the revegetation and reforestation of the prepared areas. 8 photos.

  10. Biomedical Data Mining

    NARCIS (Netherlands)

    Peek, N.; Combi, C.; Tucker, A.

    2009-01-01

    Objective: To introduce the special topic of Methods of Information in Medicine on data mining in biomedicine, with selected papers from two workshops on Intelligent Data Analysis in bioMedicine (IDAMAP) held in Verona (2006) and Amsterdam (2007). Methods: Defining the field of biomedical data

  11. Mining water governance

    NARCIS (Netherlands)

    Sosa Landeo, Milagros

    2017-01-01

    This thesis documents as well as questions how the presence of large mining operations in Andean regions of Peru alters social and natural landscapes. Taking conflicts over water as a useful entry-point for the analysis, it explores and unravels the dilemmas and challenges faced by the main

  12. Thin seam mining

    Energy Technology Data Exchange (ETDEWEB)

    Sikora, W [Politechnika Slaska, Gliwice (Poland). Instytut Mechanizacji Gornictwa

    1989-06-01

    Discusses thin seam mining in Poland and its prospects. There were 194 working faces in coal seams to 1.5 m thick in Poland in 1988. Of them, 115 fell on faces with powered supports, 79 on faces with SHC-40 and Valent props; 108 shearer loaders and 45 coal plows were used for longwall mining of thin coal seams. Drilling and blasting was used to mine 21 working faces. Longwall faces in seams to 1.0 m thick gave 2.0% coal output, faces in coal seams 1.01-1.5 m thick gave 12.2% of daily coal output of underground mining. Structure of daily coal output of faces in thin seams was the following: 52 faces below 300 t/day, 42 from 301-500 t/day, 63 from 501 to 1,000 t/day, 17 faces above 1,000 t/day. Prospects for increasing coal output of faces in thin seams are discussed. 7 refs.

  13. Frequent pattern mining

    CERN Document Server

    Aggarwal, Charu C

    2014-01-01

    Proposes numerous methods to solve some of the most fundamental problems in data mining and machine learning Presents various simplified perspectives, providing a range of information to benefit both students and practitioners Includes surveys on key research content, case studies and future research directions

  14. Contextual Text Mining

    Science.gov (United States)

    Mei, Qiaozhu

    2009-01-01

    With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual information. Those contexts can be explicit, such as the time and the location where a blog article is written, and the…

  15. Title to mining properties

    International Nuclear Information System (INIS)

    Crouch, K.M.

    1976-01-01

    The requirements of the law which must be met in order to create title to an unpatented mining claim and the procedures which should be followed when an attempt is made to determine the title to the claim is acceptable are reviewed

  16. Large Data Set Mining

    NARCIS (Netherlands)

    Leemans, I.B.; Broomhall, Susan

    2017-01-01

    Digital emotion research has yet to make history. Until now large data set mining has not been a very active field of research in early modern emotion studies. This is indeed surprising since first, the early modern field has such rich, copyright-free, digitized data sets and second, emotion studies

  17. Making Pattern Mining Useful

    NARCIS (Netherlands)

    Vreeken, J.

    2009-01-01

    The discovery of patterns plays an important role in data mining. A pattern can be any type of regularity displayed in that data, such as, e.g. which items are typically sold together, which genes are mostly active for patients of a certain disease, etc, etc. Generally speaking, finding a pattern is

  18. ERA's Ranger uranium mine

    International Nuclear Information System (INIS)

    Davies, W.

    1997-01-01

    Energy Resource of Australia (ERA) is a public company with 68% of its shares owned by the Australian company North Limited. It is currently operating one major production centre - Ranger Mine which is 260 kilometres east of Darwin, extracting and selling uranium from the Ranger Mine in the Northern Territory to nuclear electricity utilities in Japan, South Korea, Europe and North America. The first drum of uranium oxide from Ranger was drummed in August 1981 and operations have continued since that time. ERA is also in the process of working towards obtaining approvals for the development of a second mine - Jabiluka which is located 20 kilometres north of Ranger. The leases of Ranger and Jabiluka adjoin. The Minister for the Environment has advised the Minister for Resources and Energy that there does not appear to be any environmental issue which would prevent the preferred Jabiluka proposal from proceeding. Consent for the development of ERA's preferred option for the development of Jabiluka is being sought from the Aboriginal Traditional Owners. Ranger is currently the third largest producing uranium mine in the world producing 4,237 tonnes of U 3 O 8 in the year to June 1997

  19. Grants Mining District

    Science.gov (United States)

    The Grants Mineral Belt was the focus of uranium extraction and production activities from the 1950s until the late 1990s. EPA is working with state, local, and federal partners to assess and address health risks and environmental effects of the mines

  20. Lunabotics Mining Competition

    Science.gov (United States)

    Mueller, Rob; Murphy, Gloria

    2010-01-01

    This slide presentation describes a competition to design a lunar robot (lunabot) that can be controlled either remotely or autonomously, isolated from the operator, and is designed to mine a lunar aggregate simulant. The competition is part of a systems engineering curriculum. The 2010 competition winners in five areas of the competition were acknowledged, and the 2011 competition was announced.

  1. Bioremediation of mine water.

    Science.gov (United States)

    Klein, Robert; Tischler, Judith S; Mühling, Martin; Schlömann, Michael

    2014-01-01

    Caused by the oxidative dissolution of sulfide minerals, mine waters are often acidic and contaminated with high concentrations of sulfates, metals, and metalloids. Because the so-called acid mine drainage (AMD) affects the environment or poses severe problems for later use, treatment of these waters is required. Therefore, various remediation strategies have been developed to remove soluble metals and sulfates through immobilization using physical, chemical, and biological approaches. Conventionally, iron and sulfate-the main pollutants in mine waters-are removed by addition of neutralization reagents and subsequent chemical iron oxidation and sulfate mineral precipitation. Biological treatment strategies take advantage of the ability of microorganisms that occur in mine waters to metabolize iron and sulfate. As a rule, these can be grouped into oxidative and reductive processes, reflecting the redox state of mobilized iron (reduced form) and sulfur (oxidized form) in AMD. Changing the redox states of iron and sulfur results in iron and sulfur compounds with low solubility, thus leading to their precipitation and removal. Various techniques have been developed to enhance the efficacy of these microbial processes, as outlined in this review.

  2. Fully Automatic Cross-Associations

    National Research Council Canada - National Science Library

    Chakrabarti, Deepayan; Modha, Dharmendra S; Papadimitriou, Spiros; Fabloutsos, Christos

    2004-01-01

    ...., k-means clustering, METIS graph partitioning, SVD/PCA and frequent itemset mining require the user to specify various parameters, such as the number of clusters, number of principal components...

  3. Identifying Prevalent Chemical Mixtures in the US Population EHP Data

    Data.gov (United States)

    U.S. Environmental Protection Agency — Frequent itemset mining (FIM), a technique used for finding patterns in consumer purchasing behavior, can be applied to data from large-scale biomonitoring studies...

  4. Mining and environment

    International Nuclear Information System (INIS)

    Pimiento, Elkin Vargas

    1998-01-01

    In order to obtain the best social and environmental results from mining activities, different solutions, which involve a variety of perspectives, have been proposed. These include the worldwide perspective based in the economy globalization paradigms; the regional perspective, focused in the integration of countries; the national perspective, which emphasizes the natural assets and development options, and finally a local perspective is incorporated to account for the participation of directly affected communities. Within this framework, the mining industry is requested to develop both technological and managerial tools appropriate to evaluate, optimize and communicate the social and environmental performance and output of its related activities, mainly in the developing countries. On the other hand, the governments have been committed to implement regulatory actions, of command and control type, based on an environmental legislation in line with the above mentioned perspectives and also to use economical instruments as a mean to accomplish environmental objectives. In Colombia the direct regulation methods have been traditionally used to prevent the environmental deterioration produced by mining activities, however, since the 1991 political constitution and the law 99 of 1993, the communities' participation and economical instruments were incorporated. A historic summary of the environmental legislation in our country from the early 70's up to now, showing its implications in mining is presented. Then a favorable tendency is indicated in the environmental improvement of the national extractive industry, accomplished as a result of the implementation of new strategies to minimize the impact of mining on the environment and to improve the well being of local communities

  5. Technologies for Decreasing Mining Losses

    Science.gov (United States)

    Valgma, Ingo; Väizene, Vivika; Kolats, Margit; Saarnak, Martin

    2013-12-01

    In case of stratified deposits like oil shale deposit in Estonia, mining losses depend on mining technologies. Current research focuses on extraction and separation possibilities of mineral resources. Selective mining, selective crushing and separation tests have been performed, showing possibilities of decreasing mining losses. Rock crushing and screening process simulations were used for optimizing rock fractions. In addition mine backfilling, fine separation, and optimized drilling and blasting have been analyzed. All tested methods show potential and depend on mineral usage. Usage in addition depends on the utilization technology. The questions like stability of the material flow and influences of the quality fluctuations to the final yield are raised.

  6. THE IMPACT OF THE MINING EXPLOITATIONS FROM BUDOI ON THE NATURAL ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Cătălin CREłU

    2013-06-01

    Full Text Available The work is an attempt to respond to what extent the environment affected by serious anthropogenic interventions (the mining exploitation from the Budoi tunnel and the Budoi Village is close to its original state or a similar one, as a result of cessation of anthropic impact and the conduct of a program of restoration and preservation of the environment.

  7. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... fertility preservation is important. These key points can help start the conversation: Cancer and cancer treatment may ... several resources listed on the reverse that can help you locate a fertility preservation specialist to discuss ...

  8. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... fertility preservation center closest to you Visit the Pediatric Oncofertility Research Foundation Visit the Patient Navigator Website ... Ginsberg JP. New advances in fertility preservation for pediatric cancer patients. Curr Opin Pediatr. 2010;23:9- ...

  9. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Cancer Ask Your Doctor Information for Patients Many adult survivors of childhood cancer feel fertility preservation and ... Fertility preservation and adolescent cancer patients: lessons from adult survivors of childhood cancer and their parents. Cancer ...

  10. 76 FR 60754 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-30

    ...-201] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final rule..., 2011, a document establishing rules to preserve the open Internet. Inadvertently the wrong paragraph... alleging violations of the open Internet rules. Federal Communications Commission. Matt Warner, Attorney...

  11. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... available and having your child see a reproductive specialist in a timely manner can improve their future ... Can you refer us to a fertility preservation specialist to discuss my child’s options further? Fertility Preservation - ...

  12. A Holistic Approach to Bit Preservation

    DEFF Research Database (Denmark)

    Zierau, Eld Maj-Britt Olmütz

    2011-01-01

    This thesis presents three main results for a holistic approach to bit preservation, where the ultimate goal is to find the optimal bit preservation strategy for specific digital material that must be digitally preserved. Digital material consists of sequences of bits, where a bit is a binary digit...... which can have the value 0 or 1. Bit preservation must ensure that the bits remain intact and readable in the future, but bit preservation is not concerned with how bits can be interpreted as e.g. an image. A holistic approach to bit preservation includes aspects that influence the final choice of a bit...... a holistic approach and include aspects of digital representation, confidentiality, availability, bit safety and costs when defining requirements for the bit preservation. Analysis of such requirements and choice of the final bit preservation solution can be supported by the three main results presented...

  13. Prolonged platelet preservation by transient metabolic suppression

    NARCIS (Netherlands)

    Badlou, Bahram Alamdary

    2006-01-01

    Introduction: Different clinical studies have shown that transfusion of stored platelets results in better haemostasis in patients with thrombocytopenia with and without a platelet function defect. Objectives: Current preservation procedures aim to optimally preserve the metabolic status of

  14. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... JP, Kolon TF. Fertility Preservation in Children and Adolescents With Cancer . Urology. 2016;91:190-6. Loren ... 10. Nieman CL, et al. Fertility preservation and adolescent cancer patients: lessons from adult survivors of childhood ...

  15. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... be fertility preservation options available and having your child see a reproductive specialist in a timely manner ... there are options for preserving fertility in your child diagnosed with cancer. You may be focused on ...

  16. Economic impact of world mining

    International Nuclear Information System (INIS)

    Walser, G.

    2002-01-01

    Mining plays a vital role in the economic development of many countries. The emerging economies are now major players in the production and availability of key commodities such as copper (70%), bauxite (40%), iron ore and precious metals. Mining also has a positive impact on the economy of many countries. Another impact of mining can be measured in terms of employment opportunities and income generation. Commercial scale mining provides employment and skills transfer to more than 2 million workers. The multiplier effect increases this benefit by a factor of between 2 and 5. The World Bank Mining Department has carried out an in-depth study on economic and social impact of mining at the community level in Chile, Peru, Bolivia, Papua New Guinea and Mali. This study demonstrates that there are substantial social and economic benefits to the community. The most positive cases are related to the growth of local small- and micro-enterprise activities. However, mining remains controversial, as true sustainable development is not only a matter of financial flows. Mining has also been associated with a number of economic and social problems. As a result there are questions about the sustainability of the economic outcome of mining. The contribution of mining to sustainable development needs to be considered in terms of economic and technical viability, ecological sustainability and social equity. To achieve this, governments, mining companies and local communities must work together to address these issues. (author)

  17. Service mining framework and application

    CERN Document Server

    Chang, Wei-Lun

    2014-01-01

    The shifting focus of service from the 1980s to 2000s has proved that IT not only lowers the cost of service but creates avenues to enhance and increase revenue through service. The new type of service, e-service, is mobile, flexible, interactive, and interchangeable. While service science provides an avenue for future service researches, the specific research areas from the IT perspective still need to be elaborated. This book introduces a novel concept-service mining-to address several research areas from technology, model, management, and application perspectives. Service mining is defined as "a systematical process including service discovery, service experience, service recovery, and service retention to discover unique patterns and exceptional values within the existing services." The goal of service mining is similar to data mining, text mining, or web mining, and aims to "detect something new" from the service pool. The major difference is the feature of service is quite distinct from the mining targe...

  18. Steam coal mines of tomorrow

    Energy Technology Data Exchange (ETDEWEB)

    McCloskey, G

    1986-07-01

    A comprehensive review of new steam coal mines being planned or developed worldwide. It shows that at least 20 major mines with a combined annual output of 110 million tonnes per annum, could add their coal to world markets in the next 10 years. The review highlights: substantial activity in Australia with at least four major mines at advanced planning stages; a strengthening of the South American export industry with 4 major mines operating in 10 years compared with just one today; no major export mines being developed in the traditional US mining areas; and the emergence of Indonesia as a major steam coal producer/exporter. The review also shows a reduction in cost/output ratios, and also the proximity of the new mines to existing infrastructure (e.g. export terminals, rail links).

  19. Preservation management for libraries, archives and museums

    CERN Document Server

    Gorman, G E

    2006-01-01

    Memory institutions such as libraries, archives, galleries and museums all share pressing concerns about preserving heritage. This book charts the diversity of preservation management in the contemporary information landscape, and offers guidance on preservation methods for the sustainability of collections from a range of international experts.

  20. Orthogonality preserving infinite dimensional quadratic stochastic operators

    International Nuclear Information System (INIS)

    Akın, Hasan; Mukhamedov, Farrukh

    2015-01-01

    In the present paper, we consider a notion of orthogonal preserving nonlinear operators. We introduce π-Volterra quadratic operators finite and infinite dimensional settings. It is proved that any orthogonal preserving quadratic operator on finite dimensional simplex is π-Volterra quadratic operator. In infinite dimensional setting, we describe all π-Volterra operators in terms orthogonal preserving operators

  1. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... website. Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open ... Diagnosed with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation ...

  2. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu ... with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for ...

  3. 32 CFR 174.18 - Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Historic preservation. 174.18 Section 174.18... Historic preservation. (a) The transfer, lease, or sale of National Register-eligible historic property to... the regulations implementing the National Historic Preservation Act (36 CFR 800.5(a)(2)(vii)). One way...

  4. 76 FR 74721 - Preserving the Open Internet

    Science.gov (United States)

    2011-12-01

    ...; Report No. 2936] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final... for broadband service to preserve and reinforce Internet freedom and openness. DATES: Oppositions to... applicability. Subject: In the Matter of Preserving the Open Internet, Broadband Industry Practices, published...

  5. Comprehensive preserving technique for Chinese chestnut storage

    International Nuclear Information System (INIS)

    Chen Yuntang; Yang Baoan; Zhang Jianwei; Li Qiufang

    2003-01-01

    Chinese chestnut can be preserved for a long time by using a comprehensive preserving technique, which consists of casing, irradiating, treating with preserving agent and controlling environment conditions. The shelftime of the treated chestnuts reaches 11 months keeping no insects, no germination and good quality for eating with the good fruit ratio of 97.5% and water losing ratio of 3.8%

  6. A holistic approach to bit preservation

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    Purpose: The purpose of this paper is to point out the importance of taking a holistic approach to bit preservation when setting out to find an optimal bit preservation solution for specific digital materials. In the last decade there has been an increasing awareness that bit preservation, which ...

  7. Mining and Integration of Environmental Data

    Science.gov (United States)

    Tran, V.; Hluchy, L.; Habala, O.; Ciglan, M.

    2009-04-01

    The project ADMIRE (Advanced Data Mining and Integration Research for Europe) is a 7th FP EU ICT project aims to deliver a consistent and easy-to-use technology for extracting information and knowledge. The project is motivated by the difficulty of extracting meaningful information by data mining combinations of data from multiple heterogeneous and distributed resources. It will also provide an abstract view of data mining and integration, which will give users and developers the power to cope with complexity and heterogeneity of services, data and processes. The data sets describing phenomena from domains like business, society, and environment often contain spatial and temporal dimensions. Integration of spatio-temporal data from different sources is a challenging task due to those dimensions. Different spatio-temporal data sets contain data at different resolutions (e.g. size of the spatial grid) and frequencies. This heterogeneity is the principal challenge of geo-spatial and temporal data sets integration - the integrated data set should hold homogeneous data of the same resolution and frequency. Thus, to integrate heterogeneous spatio-temporal data from distinct source, transformation of one or more data sets is necessary. Following transformation operation are required: • transformation to common spatial and temporal representation - (e.g. transformation to common coordinate system), • spatial and/or temporal aggregation - data from detailed data source are aggregated to match the resolution of other resources involved in the integration process, • spatial and/or temporal record decomposition - records from source with lower resolution data are decomposed to match the granularity of the other data source. This operation decreases data quality (e.g. transformation of data from 50km grid to 10 km grid) - data from lower resolution data set in the integrated schema are imprecise, but it allows us to preserve higher resolution data. We can decompose the

  8. Processes of Reinterpretation of Mining Heritage: the Case of Bergslagen, Sweden

    Directory of Open Access Journals (Sweden)

    Albina Pashkevich

    2017-03-01

    Full Text Available Mining heritage is often used as a powerful tool in maintaining a sense of place and national identity, and Sweden is not different in this respect. Another important motive for the revival of the mining past is the opportunity for the economic revitalisation of the space marked by the deindustrialisation process. The aim of this paper is to investigate how mining heritage is interpreted and used for the goals of tourism destination development based on the five provinces in the middle part of Sweden that are called Bergslagen. The first decade of the 2000s was characterised by the prevailing top-down approach to the regeneration process of the mining landscape of Bergslagen; the process was led by public institutions that were mainly concerned with preserving the cultural heritage left over from the mining era. This resulted in the absence of a diverse and innovative thinking in terms of the touristic development of these destinations. Municipalities in the region ended up with multiple mining sites trying to attract visitors with similar types of experiences based on the limited representations of the regional mining heritage. Enhancing communication between the managers of the mining sites and closer collaboration with other tourism sites in the same region would improve visitation. Additionally, alternative interpretations of the heritage might allow for a wider representation of local people, as well as an awareness of the local or regional heritage of Bergslagen.

  9. DIGITAL WORKFLOWS FOR A 3D SEMANTIC REPRESENTATION OF AN ANCIENT MINING LANDSCAPE

    Directory of Open Access Journals (Sweden)

    G. Hiebel

    2017-08-01

    Full Text Available The ancient mining landscape of Schwaz/Brixlegg in the Tyrol, Austria witnessed mining from prehistoric times to modern times creating a first order cultural landscape when it comes to one of the most important inventions in human history: the production of metal. In 1991 a part of this landscape was lost due to an enormous landslide that reshaped part of the mountain. With our work we want to propose a digital workflow to create a 3D semantic representation of this ancient mining landscape with its mining structures to preserve it for posterity. First, we define a conceptual model to integrate the data. It is based on the CIDOC CRM ontology and CRMgeo for geometric data. To transform our information sources to a formal representation of the classes and properties of the ontology we applied semantic web technologies and created a knowledge graph in RDF (Resource Description Framework. Through the CRMgeo extension coordinate information of mining features can be integrated into the RDF graph and thus related to the detailed digital elevation model that may be visualized together with the mining structures using Geoinformation systems or 3D visualization tools. The RDF network of the triple store can be queried using the SPARQL query language. We created a snapshot of mining, settlement and burial sites in the Bronze Age. The results of the query were loaded into a Geoinformation system and a visualization of known bronze age sites related to mining, settlement and burial activities was created.

  10. Potential for enhancing nongame bird habitat values on abandoned mine lands of western North Dakota

    International Nuclear Information System (INIS)

    Burley, J.B.; Hopkins, R.B.

    1984-01-01

    Throughout western North Dakota the number of unreclaimed surface coal and coal-uranium mines might total over 1100. We examined the potential for enhancing the nongame bird habitat values of unreclaimed mine lands in the arid, western region of North Dakota. Generally, the greatest variety of birds occurred in natural and planted woodlands, while fewer birds occurred in unreclaimed mine lands, grasslands, shrublands and croplands. Deciduous woodland types supported more species of birds than coniferous types. Planted woodlands supported about the same number of bird species as some natural deciduous woodland types and more species than coniferous woods. Unreclaimed mine lands supported more species than grasslands and croplands, and about the same number of species as native shrublands. The highest bird densities were in planted woodlands. Bird diversity varied positively with habitat diversity. The bird fauna of unreclaimed mine lands can be enhanced by creating more diverse habitats. Seventeen guidelines to enhance unreclaimed mine lands for nongame birds are presented. These guidelines can be used in preserving habitats threatened by surface mining and reclaiming previously mined lands

  11. Digital Workflows for a 3d Semantic Representation of AN Ancient Mining Landscape

    Science.gov (United States)

    Hiebel, G.; Hanke, K.

    2017-08-01

    The ancient mining landscape of Schwaz/Brixlegg in the Tyrol, Austria witnessed mining from prehistoric times to modern times creating a first order cultural landscape when it comes to one of the most important inventions in human history: the production of metal. In 1991 a part of this landscape was lost due to an enormous landslide that reshaped part of the mountain. With our work we want to propose a digital workflow to create a 3D semantic representation of this ancient mining landscape with its mining structures to preserve it for posterity. First, we define a conceptual model to integrate the data. It is based on the CIDOC CRM ontology and CRMgeo for geometric data. To transform our information sources to a formal representation of the classes and properties of the ontology we applied semantic web technologies and created a knowledge graph in RDF (Resource Description Framework). Through the CRMgeo extension coordinate information of mining features can be integrated into the RDF graph and thus related to the detailed digital elevation model that may be visualized together with the mining structures using Geoinformation systems or 3D visualization tools. The RDF network of the triple store can be queried using the SPARQL query language. We created a snapshot of mining, settlement and burial sites in the Bronze Age. The results of the query were loaded into a Geoinformation system and a visualization of known bronze age sites related to mining, settlement and burial activities was created.

  12. Radiation preservation of cooked foods

    International Nuclear Information System (INIS)

    Aurangzeb; Bibi, N.; Badshah, A.; Khan, I.

    1989-01-01

    The preservation of irradiated cooked food has been explained in this report under vacuum conditions. The samples were irradiated at dose levels of 7.5 and 10.0 LGy. Measurement of fungal count was carried immediately after irradiation and after each 15 days of storage life upto 60 days of time interval. The samples were evaluated organolepticaly as well. It has been observed that no significance difference was observed among samples of irradiated and vacuum packed controls during storage for 45 days. (A.B.)

  13. Polarization preservation in the AGS

    International Nuclear Information System (INIS)

    Ratner, L.G.

    1983-01-01

    The successful operation of a high energy polarized beam at the Argonne Zero Gradient Synchrotron (ZGS) with the concommitant development of depolarizing resonance correction techniques has led to the present project of commissioning such a beam at the Brookhaven Alternating Gradient Synchrotron (AGS). A description of the project was presented at the 1981 National Accelerator Conference. I would like to now present a more detailed description of how we plan to preserve the polarization during acceleration, and to present our game plan for tuning through some 50 resonances and reaching our goal of a 26 GeV polarized proton beam with greater than 60% polarization

  14. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  15. Public feelings and environmental impacts from uranium mining inside Kakadu National Park and around Grand Canyon National Park

    International Nuclear Information System (INIS)

    McKlveen, J.W.; Kvasnicka, J.

    1989-01-01

    There are two uranium mines in the Northern Territory of Australia, Ranger and Nabarlek. The Ranger mine, the only producing operation, is located in the Kakadu National Park, which has been listed on the United Nations' World Heritage list. The park is dedicated to preserving the Australian aboriginal culture: It contains several aboriginal villages and historic sites. Uranium mining in the park has been accepted quite well by the public and the aborigines. Employees of the Ranger mine and their relatives have established a public information program that includes tours of the mining and milling operations. There is no environmental impact to the area from the mining and milling of uranium at the Ranger site. The region around the Grand Canyon contains many highgrade uranium deposits. The ore is contained in unique breccia pipe formations. The pipes, which resemble a cylinder with a diemter of ∼ 100 m and a height of ∼ 300 m, originated as limestone solution cavities located ∼ 400 m below the plateau. There are several exposed deposits along the canyon walls, but no mining operations are allowed within the park boundaries. While the real environmental impact is insignificant, the perceived impact is tremendous. Many special-interest groups have attempted to halt the mining operations. No valid environmental impacts have been predicted or observed as a result of the current mining operations. However, one mine has been delayed for religious reasons by a local tribe or native Americans

  16. Mining with microbes

    International Nuclear Information System (INIS)

    Rawlings., D.E.; Silver, S.

    1995-01-01

    Microbes are playing increasingly important roles in commercial mining operations, where they are being used in the open-quotes bioleachingclose quotes of copper, uranium, and gold ores. Direct leaching is when microbial metabolism changes the redox state of the metal being harvested, rendering it more soluble. Indirect leaching includes redox chemistry of other metal cations that are then coupled in chemical oxidation or reduction of the harvested metal ion and microbial attack upon and solubilization of the mineral matrix in which the metal is physically embedded. In addition, bacterial cells are used to detoxify the waste cyanide solution from gold-mining operations and as open-quotes absorbantsclose quotes of the mineral cations. Bacterial cells may replace activated carbon or alternative biomass. With an increasing understanding of microbial physiology, biochemistry and molecular genetics, rational approaches to improving these microbial activities become possible. 40 refs., 3 figs

  17. Action Rules Mining

    CERN Document Server

    Dardzinska, Agnieszka

    2013-01-01

    We are surrounded by data, numerical, categorical and otherwise, which must to be analyzed and processed to convert it into information that instructs, answers or aids understanding and decision making. Data analysts in many disciplines such as business, education or medicine, are frequently asked to analyze new data sets which are often composed of numerous tables possessing different properties. They try to find completely new correlations between attributes and show new possibilities for users.   Action rules mining discusses some of data mining and knowledge discovery principles and then describe representative concepts, methods and algorithms connected with action. The author introduces the formal definition of action rule, notion of a simple association action rule and a representative action rule, the cost of association action rule, and gives a strategy how to construct simple association action rules of a lowest cost. A new approach for generating action rules from datasets with numerical attributes...

  18. Ontario's uranium mining industry

    International Nuclear Information System (INIS)

    Runnalls, O.J.C.

    1981-01-01

    This report traces the Ontario uranium mining industry from the first discovery of uranium north of Sault Ste. Marie through the uranium boom of the 1950's when Elliot Lake and Bancroft were developed, the cutbacks of the 1960s, the renewed enthusiasm in exploration and development of the 1970s to the current position when continued production for the domestic market is assured. Ontario, with developed mines and operational expertise, will be in a position to compete for export markets as they reopen. The low level of expenditures for uranium exploration and the lack of new discoveries are noted. The report also reviews and places in perspective the development of policies and regulations governing the industry and the jurisdictional relationships of the Federal and Provincial governments

  19. The Bitcoin Mining Game

    Directory of Open Access Journals (Sweden)

    Nicolas Houy

    2016-12-01

    Full Text Available This article deals with the mining incentives in the Bitcoin protocol. The mining process is used to confirm and secure transactions. This process is organized as a speed game between individuals or firms – the miners – with different computational powers to solve a mathematical problem, bring a proof of work, spread their solution and reach consensus among the Bitcoin network nodes with it. First, we define and specify this game. Second, we analytically find its Nash equilibria in the two-player case. We analyze the parameters for which the miners would face the proper incentives to fulfill their function of transaction processors in the current situation. Finally, we study the block space market offer.

  20. Realtime mine ventilation simulation

    International Nuclear Information System (INIS)

    McDaniel, K.H.

    1997-01-01

    This paper describes the development of a Windows based, interactive mine ventilation simulation software program at the Waste Isolation Pilot Plant (WIPP). To enhance the operation of the underground ventilation system, Westinghouse Electric Corporation developed the program called WIPPVENT. While WIPPVENT includes most of the functions of the commercially available simulation program VNETPC and uses the same subroutine to calculate airflow distributions, the user interface has been completely rewritten as a Windows application with screen graphics. WIPPVENT is designed to interact with WIPP ventilation monitoring systems through the sitewise Central monitoring System. Data can be continuously collected from the Underground Ventilation Remote Monitoring and Control System (e.g., air quantity and differential pressure) and the Mine Weather Stations (psychrometric data). Furthermore, WIPPVENT incorporates regulator characteristic curves specific to the site. The program utilizes this data to create and continuously update a REAL-TIME ventilation model. This paper discusses the design, key features, and interactive capabilities of WIPPVENT

  1. Mine Waste Disposal and Managements

    Energy Technology Data Exchange (ETDEWEB)

    Cheong, Young-Wook; Min, Jeong-Sik; Kwon, Kwang-Soo [Korea Institute of Geology Mining and Materials, Taejon (KR)] (and others)

    1999-12-01

    This research project deals with: Analysis and characterization of mine waste piles or tailings impoundment abandoned in mining areas; Survey of mining environmental pollution from mine waste impounds; Modelling of pollutants in groundwater around tailings impoundment; Demonstration of acid rock drainage from coal mine waste rock piles and experiment of seeding on waste rock surface; Development of a liner using tailings. Most of mine wastes are deposited on natural ground without artificial liners and capping for preventing contamination of groundwater around mine waste piles or containments. In case of some mine waste piles or containments, pollutants have been released to the environment, and several constituents in drainage exceed the limit of discharge from landfill site. Metals found in drainage exist in exchangeable fraction in waste rock and tailings. This means that if when it rains to mine waste containments, mine wastes can be pollutant to the environment by release of acidity and metals. As a result of simulation for hydraulic potentials and groundwater flow paths within the tailings, the simulated travel paths correlated well with the observed contaminant distribution. The plum disperse, both longitudinal and transverse dimensions, with time. Therefore liner system is a very important component in tailings containment system. As experimental results of liner development using tailings, tailings mixed with some portion of resin or cement may be used for liner because tailings with some additives have a very low hydraulic conductivity. (author). 39 refs.

  2. Modelling the Costs of Preserving Digital Assets

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2012-01-01

    Information is increasingly being produced in digital form, and some of it must be preserved for the longterm. Digital preservation includes a series of actively managed activities that require on-going funding. To obtain sufficient resources, there is a need for assessing the costs...... and the benefits accrued by preserving the assets. Cost data is also needed for optimizing activities and comparing the costs of different preservation alternatives. The purpose of this study is to analyse generic requirements for modelling the cost of preserving digital assets. The analysis was based...

  3. Health in uranium mining

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1964-01-15

    Safety in mining radioactive ores, and in milling and treating them, has been a serious preoccupation for some thirty years. Much earlier than this, however, a high incidence of lung cancer had been reported among the miners of the Erzgebirge mountains in the German-Czechoslovak border region (places familiar under the names of Schneeberg and St. Joachims thai). Investigations into deaths from radium poisoning began at these mines in 1937, and the results seemed to indicate a causal connection between the radioactive substances and the development of lung cancer and other diseases. These matters were discussed in Vienna at the symposium on Radiological Health and Safety in Nuclear Materials Mining and Milling, 26-31 August 1963. The symposium was organized by IAEA and co-sponsored by ILO and WHO; some 70 papers were presented. The purpose of the meeting was to collect and compare the very widely scattered research results and practical experience in this field. One conclusion which emerged was that the milling of uranium ore involves no unusual problem. Provided standard controls - as applied to the treatment of other minerals - are strictly enforced, exposure to radiation can be kept to a minimum. In the actual mining of uranium, the problems are only beginning to be clearly defined, but it seems to be well established that exposure of miners to excessive levels of radon will have most serious consequences. In a complicated pattern there are many factors at work, ranging from the physical behaviour of sundry radioactive substances to the personal histories of individual miners. The need for considerably more research was stressed throughout the discussions.

  4. Health in uranium mining

    International Nuclear Information System (INIS)

    1964-01-01

    Safety in mining radioactive ores, and in milling and treating them, has been a serious preoccupation for some thirty years. Much earlier than this, however, a high incidence of lung cancer had been reported among the miners of the Erzgebirge mountains in the German-Czechoslovak border region (places familiar under the names of Schneeberg and St. Joachims thai). Investigations into deaths from radium poisoning began at these mines in 1937, and the results seemed to indicate a causal connection between the radioactive substances and the development of lung cancer and other diseases. These matters were discussed in Vienna at the symposium on Radiological Health and Safety in Nuclear Materials Mining and Milling, 26-31 August 1963. The symposium was organized by IAEA and co-sponsored by ILO and WHO; some 70 papers were presented. The purpose of the meeting was to collect and compare the very widely scattered research results and practical experience in this field. One conclusion which emerged was that the milling of uranium ore involves no unusual problem. Provided standard controls - as applied to the treatment of other minerals - are strictly enforced, exposure to radiation can be kept to a minimum. In the actual mining of uranium, the problems are only beginning to be clearly defined, but it seems to be well established that exposure of miners to excessive levels of radon will have most serious consequences. In a complicated pattern there are many factors at work, ranging from the physical behaviour of sundry radioactive substances to the personal histories of individual miners. The need for considerably more research was stressed throughout the discussions.

  5. Uranium mining in Australia

    International Nuclear Information System (INIS)

    Mackay, G.A.

    1978-01-01

    Western world requirements for uranium based on increasing energy consumption and a changing energy mix, will warrant the development of Australia's resources. By 1985 Australian mines could be producing 9500 tonnes of uranium oxide yearly and by 1995 the export value from uranium could reach that from wool. In terms of benefit to the community the economic rewards are considerable but, in terms of providing energy to the world, Australias uranium is vital

  6. Special survey: mining industry

    International Nuclear Information System (INIS)

    Preece, H.

    1981-01-01

    South Africa is now the world's second biggest producer of non-oil minerals after the United States and far ahead of Canada and Australia, according to the author. South Africa's economic growth prospects over the 1980's are inevitably crucially dependent on the mining industry. The production and economics of various minerals are discussed, with special reference to gold, coal, diamonds, uranium, platinum, manganese, copper and asbestos

  7. Data Mining and Analysis

    Science.gov (United States)

    Samms, Kevin O.

    2015-01-01

    The Data Mining project seeks to bring the capability of data visualization to NASA anomaly and problem reporting systems for the purpose of improving data trending, evaluations, and analyses. Currently NASA systems are tailored to meet the specific needs of its organizations. This tailoring has led to a variety of nomenclatures and levels of annotation for procedures, parts, and anomalies making difficult the realization of the common causes for anomalies. Making significant observations and realizing the connection between these causes without a common way to view large data sets is difficult to impossible. In the first phase of the Data Mining project a portal was created to present a common visualization of normalized sensitive data to customers with the appropriate security access. The tool of the visualization itself was also developed and fine-tuned. In the second phase of the project we took on the difficult task of searching and analyzing the target data set for common causes between anomalies. In the final part of the second phase we have learned more about how much of the analysis work will be the job of the Data Mining team, how to perform that work, and how that work may be used by different customers in different ways. In this paper I detail how our perspective has changed after gaining more insight into how the customers wish to interact with the output and how that has changed the product.

  8. Organizational Data Mining

    Science.gov (United States)

    Nemati, Hamid R.; Barko, Christopher D.

    Many organizations today possess substantial quantities of business information but have very little real business knowledge. A recent survey of 450 business executives reported that managerial intuition and instinct are more prevalent than hard facts in driving organizational decisions. To reverse this trend, businesses of all sizes would be well advised to adopt Organizational Data Mining (ODM). ODM is defined as leveraging Data Mining tools and technologies to enhance the decision-making process by transforming data into valuable and actionable knowledge to gain a competitive advantage. ODM has helped many organizations optimize internal resource allocations while better understanding and responding to the needs of their customers. The fundamental aspects of ODM can be categorized into Artificial Intelligence (AI), Information Technology (IT), and Organizational Theory (OT), with OT being the key distinction between ODM and Data Mining. In this chapter, we introduce ODM, explain its unique characteristics, and report on the current status of ODM research. Next we illustrate how several leading organizations have adopted ODM and are benefiting from it. Then we examine the evolution of ODM to the present day and conclude our chapter by contemplating ODM's challenging yet opportunistic future.

  9. Coal mine subsidence

    International Nuclear Information System (INIS)

    Darmody, R.G.; Hetzler, R.T.; Simmons, F.W.

    1992-01-01

    Longwall coal mining in southern Illinois occurs beneath some of the best agricultural land in the U.S. This region is characterized by highly productive, nearly level, and somewhat poorly drained soils. Subsidence from longwall mining causes changes in surface topography which alters surface and subsurface hydrology. These changes can adversely affect agricultural land by creating wet or ponded areas that can be deleterious to crop production. While most subsided areas show little impact from subsidence, some areas experience total crop failure. Coal companies are required by law to mitigate subsidence damage to cropland. The objective of this paper is to test the effectiveness of mitigation in restoring grain yields to their pre-mined levels. The research was conducted on sites selected to represent conventional mitigation techniques on the predominate soils in the area. Corn (Zea mays L.) and soybean [Glycine max.(L.) Merr] yields in 1988, 1989, 1990, and 1991 from mitigated areas were compared to yields from nearby undisturbed areas

  10. Health in mines

    Energy Technology Data Exchange (ETDEWEB)

    Breuer, H

    1978-01-01

    This report summarizes the information gained from research carried out under the five-year programme (1971-1976) relating to health in mines. This programme concentrates on technical means of dust control, and the various aspects of this topic are reviewed. The purpose of the epidemiology of pneumoconiosis is to determine the origin and development of this endemic disease with a view to formulating a policy of worker protection. The constituents of dust and their possible influences are studied. Measuring and determining the characteristics of dusts are the subject of the second group of research projects. Prevention techniques have been proposed, tried out and developed, thus providing the mining industry with a set of dust control methods. water infusion, dedusting on coal-getting and heading machines, control of dust produced by caving, etc. A chapter devoted to iron ore mines discusses means of protection against noxious emissions from Diesel engines and explosives. (Editions available in English, in German, in French, in Italian, and in Dutch)

  11. OAIS and Distributed Digital Preservation in Practice

    DEFF Research Database (Denmark)

    Zierau, Eld

    The aim of the paper is to illustrate how the distributed aspects of digital preservation can be aligned in practice, with the concepts and principles of the Open Archival Information System (OAIS) Reference Model. There has been a growing awareness within the digital preservation community...... of the need for cooperation between organizations to address digital preservation requirements. One common example is that replicas of preservation copies of digital objects need to be independently preserved (e.g., stored, managed, monitored, documented) to ensure that at least one correct replica...... will survive for as long as needed. Such independence can be achieved through distributed digital preservation that relies upon specific agreements between participating and contributing organizations. The OAIS Reference Model does not address the challenges of distributed digital preservation in detail...

  12. Preservation of forest wood chips

    Energy Technology Data Exchange (ETDEWEB)

    Kofman, P.D.; Thomsen, I.M.; Ohlsson, C.; Leer, E.; Ravn Schmidt, E.; Soerensen, M.; Knudsen, P.

    1999-01-01

    As part of the Danish Energy Research Programme on biomass utilisation for energy production (EFP), this project concerns problems connected to the handling and storing of wood chips. In this project, the possibility of preserving wood chips of the Norway Spruce (Picea Abies) is addressed, and the potential improvements by anaerobic storage are tested. Preservation of wood chips aims at reducing dry matter losses from extensive heating during storage and to reduce production of fungal spores. Fungal spores pose a health hazards to workers handling the chips. Further the producers of wood chips are interested in such a method since it would enable them to give a guarantee for the delivery of homogeneous wood chips also during the winter period. Three different types of wood chips were stored airtight and further one of these was stored in accordance with normal practise and use as reference. The results showed that airtight storage had a beneficial impact on the quality of the chips: no redistribution of moisture, low dry matter losses, unfavourable conditions for microbial activity of most fungi, and the promotion of yeasts instead of fungi with airborne spores. Likewise the firing tests showed that no combustion problems, and no increased risk to the environment or to the health of staff is caused by anaerobic storage of wood chips. In all, the tests of the anaerobic storage method of forest wood chips were a success and a large-scale test of the method will be carried out in 1999. (au)

  13. Preserving information in neural transmission.

    Science.gov (United States)

    Sincich, Lawrence C; Horton, Jonathan C; Sharpee, Tatyana O

    2009-05-13

    Along most neural pathways, the spike trains transmitted from one neuron to the next are altered. In the process, neurons can either achieve a more efficient stimulus representation, or extract some biologically important stimulus parameter, or succeed at both. We recorded the inputs from single retinal ganglion cells and the outputs from connected lateral geniculate neurons in the macaque to examine how visual signals are relayed from retina to cortex. We found that geniculate neurons re-encoded multiple temporal stimulus features to yield output spikes that carried more information about stimuli than was available in each input spike. The coding transformation of some relay neurons occurred with no decrement in information rate, despite output spike rates that averaged half the input spike rates. This preservation of transmitted information was achieved by the short-term summation of inputs that geniculate neurons require to spike. A reduced model of the retinal and geniculate visual responses, based on two stimulus features and their associated nonlinearities, could account for >85% of the total information available in the spike trains and the preserved information transmission. These results apply to neurons operating on a single time-varying input, suggesting that synaptic temporal integration can alter the temporal receptive field properties to create a more efficient representation of visual signals in the thalamus than the retina.

  14. Towards Interoperable Preservation Repositories: TIPR

    Directory of Open Access Journals (Sweden)

    Priscilla Caplan

    2010-07-01

    Full Text Available Towards Interoperable Preservation Repositories (TIPR is a project funded by the Institute of Museum and Library Services to create and test a Repository eXchange Package (RXP. The package will make it possible to transfer complex digital objects between dissimilar preservation repositories.  For reasons of redundancy, succession planning and software migration, repositories must be able to exchange copies of archival information packages with each other. Every different repository application, however, describes and structures its archival packages differently. Therefore each system produces dissemination packages that are rarely understandable or usable as submission packages by other repositories. The RXP is an answer to that mismatch. Other solutions for transferring packages between repositories focus either on transfers between repositories of the same type, such as DSpace-to-DSpace transfers, or on processes that rely on central translation services.  Rather than build translators between many dissimilar repository types, the TIPR project has defined a standards-based package of metadata files that can act as an intermediary information package, the RXP, a lingua franca all repositories can read and write.

  15. Brief concept of hip preservation

    Directory of Open Access Journals (Sweden)

    Sanjeev S. Madan

    2017-12-01

    Full Text Available Restoration of the anatomy of the hip joint and biomechanics across it, carry the immense importance to prevent future osteoarthritis of the joint. The aim of this review is to provide the brief concept of the methods to preserve the hip, especially in young adults. Attempts to preserve the hips start with the intense preoperative planning of the corrective procedure. Different parameters regarding the femur and acetabulum in all 3 dimensions need to be assessed. Especially, measurement of the anteversion of the femur and acetabulum is a significant step to avoid osteoarthritis. In addition, the suprapelvic and infrapelvic (spine and lower limb lengths alignment needs to be considered in the planning. Correction of the femoral side of the hip needs the understanding of the blood supply of the proximal femur which carries the risk of avascular necrosis more so with intracapsular osteotomies. Acetabular reorientation, to re-distribute the forces over the weight bearing part, can be carried out with re-directional osteotomy such as periacetabular osteotomy. It needs the understanding of the acetabular anatomy and the force distribution in it. To conclude, correction of both femoral and acetabular side parameters need to be considered in decision making depending on the alterations due to various etiologies causing the hip disorders.

  16. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  17. Mining technology and policy issues 1983

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This book presents conference papers on advances in mineral processing, coal mining, communications for mining executives, environmental laws and regulations, exploration philosophy, exploration technology, government controls and the environment, management, mine finance, minerals availability, mine safety, occupational health, open pit mining, the precious metals outlook, public lands, system improvements in processing ores, and underground mining. Topics considered include coal pipelines and saline water, an incentive program for coal mines, sandwich belt high-angle conveyors, the development of a mining company, regulations for radionuclides, contracts for western coal production for Pacific Rim exports, and the control of radon daughters in underground mines

  18. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  19. Is my network module preserved and reproducible?

    Directory of Open Access Journals (Sweden)

    Peter Langfelder

    2011-01-01

    Full Text Available In many applications, one is interested in determining which of the properties of a network module change across conditions. For example, to validate the existence of a module, it is desirable to show that it is reproducible (or preserved in an independent test network. Here we study several types of network preservation statistics that do not require a module assignment in the test network. We distinguish network preservation statistics by the type of the underlying network. Some preservation statistics are defined for a general network (defined by an adjacency matrix while others are only defined for a correlation network (constructed on the basis of pairwise correlations between numeric variables. Our applications show that the correlation structure facilitates the definition of particularly powerful module preservation statistics. We illustrate that evaluating module preservation is in general different from evaluating cluster preservation. We find that it is advantageous to aggregate multiple preservation statistics into summary preservation statistics. We illustrate the use of these methods in six gene co-expression network applications including 1 preservation of cholesterol biosynthesis pathway in mouse tissues, 2 comparison of human and chimpanzee brain networks, 3 preservation of selected KEGG pathways between human and chimpanzee brain networks, 4 sex differences in human cortical networks, 5 sex differences in mouse liver networks. While we find no evidence for sex specific modules in human cortical networks, we find that several human cortical modules are less preserved in chimpanzees. In particular, apoptosis genes are differentially co-expressed between humans and chimpanzees. Our simulation studies and applications show that module preservation statistics are useful for studying differences between the modular structure of networks. Data, R software and accompanying tutorials can be downloaded from the following webpage: http

  20. Economics of mining law

    Science.gov (United States)

    Long, K.R.

    1995-01-01

    Modern mining law, by facilitating socially and environmentally acceptable exploration, development, and production of mineral materials, helps secure the benefits of mineral production while minimizing environmental harm and accounting for increasing land-use competition. Mining investments are sunk costs, irreversibly tied to a particular mineral site, and require many years to recoup. Providing security of tenure is the most critical element of a practical mining law. Governments owning mineral rights have a conflict of interest between their roles as a profit-maximizing landowner and as a guardian of public welfare. As a monopoly supplier, governments have considerable power to manipulate mineral-rights markets. To avoid monopoly rent-seeking by governments, a competitive market for government-owned mineral rights must be created by artifice. What mining firms will pay for mineral rights depends on expected exploration success and extraction costs. Landowners and mining firms will negotlate respective shares of anticipated differential rents, usually allowing for some form of risk sharing. Private landowners do not normally account for external benefits or costs of minerals use. Government ownership of mineral rights allows for direct accounting of social prices for mineral-bearing lands and external costs. An equitable and efficient method is to charge an appropriate reservation price for surface land use, net of the value of land after reclamation, and to recover all or part of differential rents through a flat income or resource-rent tax. The traditional royalty on gross value of production, essentially a regressive income tax, cannot recover as much rent as a flat income tax, causes arbitrary mineral-reserve sterilization, and creates a bias toward development on the extensive margin where marginal environmental costs are higher. Mitigating environmental costs and resolving land-use conflicts require local evaluation and planning. National oversight ensures

  1. Mining highly stressed areas, part 2.

    CSIR Research Space (South Africa)

    Johnson, R

    1995-12-01

    Full Text Available A questionnaire related to mining at great depth and in very high stress conditions has been completed with the assistance of mine rock mechanics personnel on over twenty mines in all mining districts, and covering all deep level mines...

  2. 36 CFR 6.7 - Mining wastes.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Mining wastes. 6.7 Section 6... DISPOSAL SITES IN UNITS OF THE NATIONAL PARK SYSTEM § 6.7 Mining wastes. (a) Solid waste from mining includes but is not limited to mining overburden, mining byproducts, solid waste from the extraction...

  3. Determine Appropriate Post Mining Land Use in Indonesia Coal Mining Using Land Suitability Evaluation

    OpenAIRE

    Maryati, Sri; Shimada, Hideki; Hamanaka, Akihiro; Sasaoka, Takashi; Matsui, Kikuo

    2012-01-01

    Coal mining industry gives many benefits for Indonesia including contribution in total Indonesian GDP. Most of coal mines in Indonesia are open pit mining method which disturbs large area of land. One of open pit mining impact is damage land and related to soil erosion occurrences it will degrade land by top soil loses. Indonesia Government has issued mine closure regulation to encourage mining industry provide post mining land use. Determination of post mining land use should be considering ...

  4. Data mining for bioinformatics applications

    CERN Document Server

    Zengyou, He

    2015-01-01

    Data Mining for Bioinformatics Applications provides valuable information on the data mining methods have been widely used for solving real bioinformatics problems, including problem definition, data collection, data preprocessing, modeling, and validation. The text uses an example-based method to illustrate how to apply data mining techniques to solve real bioinformatics problems, containing 45 bioinformatics problems that have been investigated in recent research. For each example, the entire data mining process is described, ranging from data preprocessing to modeling and result validation. Provides valuable information on the data mining methods have been widely used for solving real bioinformatics problems Uses an example-based method to illustrate how to apply data mining techniques to solve real bioinformatics problems Contains 45 bioinformatics problems that have been investigated in recent research.

  5. Mine waters: Acidic to circumneutral

    Science.gov (United States)

    Nordstrom, D. Kirk

    2011-01-01

    Acid mine waters, often containing toxic concentrations of Fe, Al, Cu, Zn, Cd, Pb, Ni, Co, and Cr, can be produced from the mining of coal and metallic deposits. Values of pH for acid mine waters can range from –3.5 to 5, but even circumneutral (pH ≈ 7) mine waters can have high concentrations of As, Sb, Mo, U, and F. When mine waters are discharged into streams, lakes, and the oceans, serious degradation of water quality and injury to aquatic life can ensue, especially when tailings impoundments break suddenly. The main acid-producing process is the exposure of pyrite to air and water, which promotes oxidative dissolution, a reaction catalyzed by microbes. Current and future mining should plan for the prevention and remediation of these contaminant discharges by the application of hydrogeochemical principles and available technologies, which might include remining and recycling of waste materials.

  6. Coal mine subsidence and structures

    International Nuclear Information System (INIS)

    Gray, R.E.

    1988-01-01

    Underground coal mining has occurred beneath 32 x 10 9 m 2 (8 million acres) of land in the United States and will eventually extend beneath 162 x 10 9 m 2 (40 million acres). Most of this mining has taken place and will take place in the eastern half of the United States. In areas of abandoned mines where total extraction was not achieved, roof collapse, crushing of coal pillars, or punching of coal pillars into softer mine floor or roof rock is now resulting in sinkhole or trough subsidence tens or even hundreds of years after mining. Difference in geology, in mining, and building construction practice between Europe and the United States preclude direct transfer of European subsidence engineering experience. Building damage cannot be related simply to tensile and compressive strains at the ground surface. Recognition of the subsidence damage role played by ground-structure interaction and by structural details is needed

  7. Data Mining Aplications in Livestock

    Directory of Open Access Journals (Sweden)

    Feyza ALEV ÇETİN

    2016-03-01

    Full Text Available Data mining provides discovering the required and applicable knowledge from very large amounts of information collected in one centre. Data mining has been used in the information industry and society. Although many methods of data mining has been used, these techniques has been remarkable in animal husbandry in recent years. For the solution of complex problems in animal husbandry many methods were discussed and developed. Brief information on data mining techniques such as k-means approach, k-nearest neighbor approach, multivariate adaptive regression function (MARS, naive Bayesian classifiers (NBC, artificial neural networks (ANN, support vector machines (SVM, decision trees are given in the study. Some data mining methods are presented and examples of the application of data mining in the field of animal husbandry in the world are provided with this study.

  8. Spatio-Temporal Rule Mining

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Pedersen, Torben Bach

    2005-01-01

    Recent advances in communication and information technology, such as the increasing accuracy of GPS technology and the miniaturization of wireless communication devices pave the road for Location-Based Services (LBS). To achieve high quality for such services, spatio-temporal data mining techniques...... are needed. In this paper, we describe experiences with spatio-temporal rule mining in a Danish data mining company. First, a number of real world spatio-temporal data sets are described, leading to a taxonomy of spatio-temporal data. Second, the paper describes a general methodology that transforms...... the spatio-temporal rule mining task to the traditional market basket analysis task and applies it to the described data sets, enabling traditional association rule mining methods to discover spatio-temporal rules for LBS. Finally, unique issues in spatio-temporal rule mining are identified and discussed....

  9. Panorama of mining activities in France during 1991

    International Nuclear Information System (INIS)

    Heinry, C.; Michel, J.C.

    1992-01-01

    1991 can be considered as year of transition during which the world economy was adapting to the new political situation arising out of the Gulf War and the collapse of the Soviet Bloc. Although a major conflict normally causes a rise in the price of gold and a high demand for base products, this time the raw materials market did not react in the normal way. The prices of almost all products dropped throughout the year, and the dollar increase (average exchange rate for the year = FF 5.65) did not compensate European industry for this drop in metal prices. The economic slowdown in America, Europe and, which is new, Japan, compounded by the consequences of CIS export, caused serious harm to western firms, including those of the European Community: seriously disrupted markets, price falls, production units in danger. The purpose of this paper is to give a panorama of mining activities in France during 1991. The French mineral sector continued with difficulty to adjust to the economic trend through reductions in staff and production capacities: the Malines Zn-Pb mine closed, uranium mines in the Vendee and Limousin closed, mining activities at the Salsigne gold mine and its refining plants stopped. The field of energy supplies saw a fall off in both coal and petroleum production. Gas production, however, rose to a level close to that of 1987. Uranium production continued to ease; in spite of a relatively stable demand, poor prices coupled with the exhaustion of certain deposits and the public's preoccupation with preserving the environment, led to mines being closed. 15 refs., 2 figs., 11 tabs

  10. Mine water purify from radium

    International Nuclear Information System (INIS)

    Lebecka, J.

    1996-01-01

    The article describes purification of radium containing water in coal mines. Author concludes that water purification is relatively simple and effective way to decrease environmental pollution caused by coal mining. The amount of radium disposed with type A radium water has been significantly decreased. The results of investigations show that it will be soon possible to purify also type B radium water. Article compares the amounts of radium disposed by coal mines in 1990, 1995 and forecast for 2000

  11. Predicting rock bursts in mines

    Science.gov (United States)

    Spall, H.

    1979-01-01

    In terms of lives lost, rock bursts in underground mines can be as hazardous as earthquakes on the surface. So it is not surprising that fo the last 40 years the U.S Bureau of Mines has been using seismic methods for detecting areas in underground mines where there is a high differential stress which could lead to structural instability of the rock mass being excavated.

  12. Text Mining Applications and Theory

    CERN Document Server

    Berry, Michael W

    2010-01-01

    Text Mining: Applications and Theory presents the state-of-the-art algorithms for text mining from both the academic and industrial perspectives.  The contributors span several countries and scientific domains: universities, industrial corporations, and government laboratories, and demonstrate the use of techniques from machine learning, knowledge discovery, natural language processing and information retrieval to design computational models for automated text analysis and mining. This volume demonstrates how advancements in the fields of applied mathematics, computer science, machine learning

  13. 76 FR 63238 - Proximity Detection Systems for Continuous Mining Machines in Underground Coal Mines

    Science.gov (United States)

    2011-10-12

    ... Detection Systems for Continuous Mining Machines in Underground Coal Mines AGENCY: Mine Safety and Health... Agency's proposed rule addressing Proximity Detection Systems for Continuous Mining Machines in... proposed rule for Proximity Detection Systems on Continuous Mining Machines in Underground Coal Mines. Due...

  14. 30 CFR 77.1712 - Reopening mines; notification; inspection prior to mining.

    Science.gov (United States)

    2010-07-01

    ... to mining. 77.1712 Section 77.1712 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION... prior to mining. Prior to reopening any surface coal mine after it has been abandoned or declared... an authorized representative of the Secretary before any mining operations in such mine are...

  15. 30 CFR 819.21 - Auger mining: Protection of underground mining.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Auger mining: Protection of underground mining. 819.21 Section 819.21 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT... STANDARDS-AUGER MINING § 819.21 Auger mining: Protection of underground mining. Auger holes shall not extend...

  16. 76 FR 70075 - Proximity Detection Systems for Continuous Mining Machines in Underground Coal Mines

    Science.gov (United States)

    2011-11-10

    ... Detection Systems for Continuous Mining Machines in Underground Coal Mines AGENCY: Mine Safety and Health... proposed rule addressing Proximity Detection Systems for Continuous Mining Machines in Underground Coal... Detection Systems for Continuous Mining Machines in Underground Coal Mines. MSHA conducted hearings on...

  17. Data mining and knowledge discovery for big data methodologies, challenge and opportunities

    CERN Document Server

    2014-01-01

    The field of data mining has made significant and far-reaching advances over the past three decades.  Because of its potential power for solving complex problems, data mining has been successfully applied to diverse areas such as business, engineering, social media, and biological science. Many of these applications search for patterns in complex structural information. In biomedicine for example, modeling complex biological systems requires linking knowledge across many levels of science, from genes to disease.  Further, the data characteristics of the problems have also grown from static to dynamic and spatiotemporal, complete to incomplete, and centralized to distributed, and grow in their scope and size (this is known as big data). The effective integration of big data for decision-making also requires privacy preservation. The contributions to this monograph summarize the advances of data mining in the respective fields. This volume consists of nine chapters that address subjects ranging from mining da...

  18. Web Mining and Social Networking

    CERN Document Server

    Xu, Guandong; Li, Lin

    2011-01-01

    This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. The applications of web mining, and the issue of how to incorporate web mining into web personalization and recommendation systems are also reviewed. Additionally, the volume explores web community mining and analysis to find the structural, organizational and temporal developments of web communities and reveal the societal s

  19. Sentiment Analysis and Opinion Mining

    CERN Document Server

    Liu, Bing

    2012-01-01

    Sentiment analysis and opinion mining is the field of study that analyzes people's opinions, sentiments, evaluations, attitudes, and emotions from written language. It is one of the most active research areas in natural language processing and is also widely studied in data mining, Web mining, and text mining. In fact, this research has spread outside of computer science to the management sciences and social sciences due to its importance to business and society as a whole. The growing importance of sentiment analysis coincides with the growth of social media such as reviews, forum discussions

  20. Data mining applications in healthcare.

    Science.gov (United States)

    Koh, Hian Chye; Tan, Gerald

    2005-01-01

    Data mining has been used intensively and extensively by many organizations. In healthcare, data mining is becoming increasingly popular, if not increasingly essential. Data mining applications can greatly benefit all parties involved in the healthcare industry. For example, data mining can help healthcare insurers detect fraud and abuse, healthcare organizations make customer relationship management decisions, physicians identify effective treatments and best practices, and patients receive better and more affordable healthcare services. The huge amounts of data generated by healthcare transactions are too complex and voluminous to be processed and analyzed by traditional methods. Data mining provides the methodology and technology to transform these mounds of data into useful information for decision making. This article explores data mining applications in healthcare. In particular, it discusses data mining and its applications within healthcare in major areas such as the evaluation of treatment effectiveness, management of healthcare, customer relationship management, and the detection of fraud and abuse. It also gives an illustrative example of a healthcare data mining application involving the identification of risk factors associated with the onset of diabetes. Finally, the article highlights the limitations of data mining and discusses some future directions.

  1. Golden prospects for uranium mine

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    Beisa Mines Ltd, a wholly-owned subsidiary of Union Corporation, looks a born winner. Although only due for completion in 1982 it can already boast several 'firsts' in the mining industry. It is, of course, the first mine in South Africa to be developed as a primary producer of uranium with gold as a by-product. Its No. 1 Ventilation Shaft is also the smallest diameter shaft in SA to use a rocker-arm shovel loader for rock removal. Moreover, Beisa will be the first mine to use the revolutionary carbon-in-pulp process on a large scale

  2. Mine water treatment in Donbass

    Energy Technology Data Exchange (ETDEWEB)

    Azarenkov, P A; Anisimov, V M; Krol, V A

    1980-10-01

    About 2,000,000 m$SUP$3 of mine water are discharged by coal mines yearly to surface waters in the Donbass. Mine water in the region is rich in mineral salts and suspended matter (coal and rock particles). The DonUGI Institute developed a system of mine water treatment which permits the percentage of suspended matter to be reduced to 1.5 mg/l. The treated mine water can be used in fire fighting and in dust suppression systems in coal mines. A scheme of the water treatment system is shown. It consists of the following stages: reservoir of untreated mine water, chamber where mine water is mixed with reagents, primary sedimentation tanks, sand filters, and chlorination. Aluminium sulphate is used as a coagulation agent. To intensify coagulation polyacrylamide is added. Technical specifications of surface structures in which water treatment is carried out are discussed. Standardized mine water treatment systems with capacities of 600 m$SUP$3/h, with 900, 1200, 1500, 1800 and 2100 m$SUP$3/h capacities are used. (In Russian)

  3. Need of Reactor Dosimetry Preservation

    International Nuclear Information System (INIS)

    Ilieva, Krassimira

    2011-01-01

    The nuclear safety requirements and philosophy have changed by the development of new nuclear systems and this imposes special research and development activity. Reactor dosimetry which is applied for determination of neutron field parameters and neutron flux responses in different regions of the reactor system plays an important role in determining of radiation exposure on reactor system elements as reactor vessel, internals, shielding; dose determination for material damage study; for conditioning of irradiation; dose determination for medicine and industry application; induced activity determination for decommissioning purposes. The management of nuclear knowledge has emerged as a growing challenge in recent years. The need to preserve and transfer nuclear knowledge is compounded by recent trends such as ageing of the nuclear workforce, declining student numbers in nuclear related fields, and the threat of losing accumulated nuclear knowledge. (author)

  4. Correlation-Preserving Photo Collage.

    Science.gov (United States)

    Liu, Lingjie; Zhang, Hongjie; Jing, Guangmei; Guo, Yanwen; Chen, Zhonggui; Wang, Wenping

    2017-05-12

    A new method is presented for producing photo collages that preserve content correlation of photos. We use deep learning techniques to find correlation among given photos to facilitate their embedding on the canvas, and develop an efficient combinatorial optimization technique to make correlated photos stay close to each other. To make efficient use of canvas space, our method first extracts salient regions of photos and packs only these salient regions. We allow the salient regions to have arbitrary shapes, therefore yielding informative, yet more compact collages than by other similar collage methods based on salient regions. We present extensive experimental results, user study results, and comparisons against the state-of-the-art methods to show the superiority of our method.

  5. Radiations to preserve world heritage

    International Nuclear Information System (INIS)

    Hurel, T.

    2017-01-01

    This article details the use of radiation to preserve the archaeological and artistic heritage. Gamma radiations are used to kill living organisms (insects, fungi and moulds) and to solidify styren-polyester resins that may be injected in wood items to reinforce them. Neutron irradiations are used to reveal the structure of an item and to get information on the materials the item is made of. Both irradiations are non-destructive. Carbon 14 dating is efficient to age items but beyond 50.000 years the method becomes ineffective and other methods like thermoluminescence take over. For instance it is the thermoluminescence method applied on flints found on the Jebel Irhoud site (Morocco) that has allowed to push back the age of the first Homo Sapiens by 100.000 years to reach 300.000 years. (A.C.)

  6. [Chemotherapy and women fertility preservation].

    Science.gov (United States)

    Gauthier, Tristan; Piver, Pascal; Durand, Lise-Marie; Donadel, Lorène; Pech, Jean-Christophe; Roux, Christophe; Aubard, Yves

    2010-01-01

    Agressive chemotherapy can lead to premature ovarian failure and loss of fertility in women and children. Embryo cryopreservation is an established clinical procedure of fertility preservation but with several limitations. Others options are available. Cryopreservation ovarian cortex tissu have to be suggested in case of high gonadotoxic treatment. It doesn't require puberty and delay in initiation of chemotherapy. The first birth in France after orthotopic graft of ovarian tissu thawed have been recently described with a promising process. Oocyte cryopreservation is available for women without partner but the experience is limited. Gonadotrophin-releasing hormone (GnRH) agonist therapy as ovarian protectants seem interesting. Follicular growth and maturation in vitro are still experimental. Copyright 2010 Elsevier Masson SAS. All rights reserved.

  7. Saliva Preservative for Diagnostic Purposes

    Science.gov (United States)

    Pierson, Duane L.; Mehta, Satish K.

    2012-01-01

    Saliva is an important body fluid for diagnostic purposes. Glycoproteins, glucose, steroids, DNA, and other molecules of diagnostic value are found in saliva. It is easier to collect as compared to blood or urine. Unfortunately, saliva also contains large numbers of bacteria that can release enzymes, which can degrade proteins and nucleic acids. These degradative enzymes destroy or reduce saliva s diagnostic value. This innovation describes the formulation of a chemical preservative that prevents microbial growth and inactivates the degradative enzymes. This extends the time that saliva can be stored or transported without losing its diagnostic value. Multiple samples of saliva can be collected if needed without causing discomfort to the subject and it does not require any special facilities to handle after it is collected.

  8. Preserving experience through expert systems

    International Nuclear Information System (INIS)

    Jelinek, J.B.; Weidman, S.H.

    1989-01-01

    Expert systems technology, one of the branches in the field of computerized artificial intelligence, has existed for >30 yr but only recently has been made available on commercially standard hardware and software platforms. An expert system can be defined as any method of encoding knowledge by representing that knowledge as a collection of facts or objects. Decisions are made by the expert program by obtaining data about the problem or situation and correlating encoded facts (knowledge) to the data until a conclusion can be reached. Such conclusions can be relayed to the end user as expert advice. Realizing the potential of this technology, General Electric (GE) Nuclear Energy (GENE) has initiated a development program in expert systems applications; this technology offers the potential for packaging, distributing, and preserving nuclear experience in a software form. The paper discusses application fields, effective applications, and knowledge acquisition and knowledge verification

  9. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  10. A node linkage approach for sequential pattern mining.

    Directory of Open Access Journals (Sweden)

    Osvaldo Navarro

    Full Text Available Sequential Pattern Mining is a widely addressed problem in data mining, with applications such as analyzing Web usage, examining purchase behavior, and text mining, among others. Nevertheless, with the dramatic increase in data volume, the current approaches prove inefficient when dealing with large input datasets, a large number of different symbols and low minimum supports. In this paper, we propose a new sequential pattern mining algorithm, which follows a pattern-growth scheme to discover sequential patterns. Unlike most pattern growth algorithms, our approach does not build a data structure to represent the input dataset, but instead accesses the required sequences through pseudo-projection databases, achieving better runtime and reducing memory requirements. Our algorithm traverses the search space in a depth-first fashion and only preserves in memory a pattern node linkage and the pseudo-projections required for the branch being explored at the time. Experimental results show that our new approach, the Node Linkage Depth-First Traversal algorithm (NLDFT, has better performance and scalability in comparison with state of the art algorithms.

  11. SMART PACKAGING FOR FOOD PRESERVATION

    Directory of Open Access Journals (Sweden)

    Raquel Rodríguez-Sauceda

    2014-07-01

    Full Text Available One of the biggest challenges of the food industry is the preservation of its products, that is, to prevent them from being attacked by microorganisms that decompose them hauling economic losses and severe health damage to the consumer. Today, competition in the food industry is very high and any company that does not offer the quality products is doomed to fail. Consumers demand more and the industry still stands offering what is asked: quality, security and safety. The package, in addition to fulfilling its core functions is becoming a means of sophisticated interactions with content and a record of relevant information for both the end consumer and intermediate players in the value chain and concepts are born of active and intelligent packaging. A smart container is defined as a system that monitors the condition of the packaged product, being able to register and provide information about product quality or condition of the container, showing the possible "abnormal" practices that have suffered the product or the container during the entire supply chain, such as transportation or storage. These systems monitor the mechanisms of altered food due to physiological, chemical and biological processes that respond and communicate changes in the status of the product as time-temperature, Oxygen, Carbon dioxide, microbial growth, etc. There are different types of smart packaging such as time-temperature indicators, color indicators, indicators of pathogens and indicators of leaks, to name a few. Through literature review, arguments that demonstrate the usefulness and necessity of the use of smart packaging to preserve the quality and safety of the product it contains, from manufacturing to the time it is used by consumers were found, as these besides communicating or providing information about their state, acting as a marketing tool.

  12. Temporal trends of preservative allergy in Denmark (1985-2008)

    DEFF Research Database (Denmark)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D

    2010-01-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory...

  13. SIAM 2007 Text Mining Competition dataset

    Data.gov (United States)

    National Aeronautics and Space Administration — Subject Area: Text Mining Description: This is the dataset used for the SIAM 2007 Text Mining competition. This competition focused on developing text mining...

  14. Geologic mapping around Mahoma mining. San Jose mining company

    International Nuclear Information System (INIS)

    Techera, J.; Arrighetii, R.

    1993-01-01

    This study has as main objective carry out a geological mapping as well as the structural analysis , in 1.5.000 scale in the zone where the gold benefit plant of San Jose mining company is settled (Mahoma Mining). From this study has been marked many drillings.

  15. Data mining and frequency analysis for licorice as a "Two-Face" herb in Chinese Formulae based on Chinese Formulae Database.

    Science.gov (United States)

    Guo, Jianming; Shang, Erxin; Zhao, Jinlong; Fan, Xinsheng; Duan, Jinao; Qian, Dawei; Tao, Weiwei; Tang, Yuping

    2014-09-25

    Liquorice is the root of Glycyrrhiza uralensis Fisch. or Glycyrrhiza glabra L., Leguminosae. Licorice is described as 'National Venerable Master' in Chinese medicine and plays paradoxical roles, i.e. detoxification/strengthen efficacy and inducing/enhancing toxicity. Therefore, licorice was called "Two-Face" herb in this paper. The aim of this study is to discuss the paradoxical roles and the perspective usage of this "Two-Face" herb using data mining and frequency analysis. More than 96,000 prescriptions from Chinese Formulae Database were selected. The frequency and the prescription patterns were analyzed using Microsoft SQL Server 2000. Data mining methods (frequent itemsets) were used to analyze the regular patterns and compatibility laws of the constituent herbs in the selected prescriptions. The result showed that licorice (Radix glycyrrhizae) was the most frequently used herb in Chinese Formulae Database, other frequently used herbs including Radix Angelicae Sinensis (Dang gui), Radix et rhizoma ginseng (Ren shen), etc. Toxic herbs such as Radix aconiti lateralis praeparata (Fu zi), Rhizoma pinelliae (Ban xia) and Cinnabaris (Zhu sha) are top 3 herbs that most frequently used in combination with licorice. Radix et rhizoma ginseng (Ren shen), Poria (Fu ling), Radix Angelicae Sinensis (Dang gui) are top 3 nontoxic herbs that most frequently used in combination with licorice. Moreover, Licorice was seldom used with sargassum (Hai Zao), Herba Cirsii Japonici (Da Ji), Euphorbia kansui (Gan Sui) and Flos genkwa (Yuan Hua), which proved the description of contradictory effect of Radix glycyrrhizae and these herbs as recorded in Chinese medicine theory. This study showed the principle pattern of Chinese herbal drugs used in combination with licorice or not. The principle patterns and special compatibility laws reported here could be useful and instructive for scientific usage of licorice in clinic application. Further pharmacological and chemical researches are

  16. Towards Building a Blog Preservation Platform

    CERN Document Server

    Kasioumis, Nikos; Kalb, Hendrik

    2014-01-01

    Social media content and user participation has increased dramatically since the advent of Web 2.0. Blogs have become relevant to every aspect of business and personal life. Nevertheless, we do not have the right tools to aggregate and preserve blog content correctly, as well as to manage blog archives effectively. Given the rising importance of blogs, it is crucial to build systems to facilitate blog preservation, safeguarding an essential part of our heritage that will prove valuable for current and future generations. In this paper, we present our work in progress towards building a novel blog preservation platform featuring robust digital preservation, management and dissemination facilities for blogs. This work is part of the BlogForever project which is aiming to make an impact to the theory and practice of blog preservation by creating guidelines and software that any individual or organization could use to preserve their blogs.

  17. Preservation Copying Endangered Historic Negative Collections

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad

    2008-01-01

    This article discusses preservation copying of unstable B&W nitrate and acetate still photographic negatives. It focuses on evaluating two different strategies for preserving the copies from a point of view of quality and cost-effectiveness. The evaluated strategies are preservation of the master...... by describing essential characteristics of negatives, which must be passed on to the copies, and the required metadata and technical imaging specifications. Next the paper discusses strategies for preservation and makes an analysis with the LIFE2 Costing Model. The paper concludes that the most beneficial...... and cost-effective preservation solution for large format negatives is to keep the preservation copies as digital files. However, it also acknowledges that it is important to revisit such strategies regularly to monitor changes in user expectations, technologies and costs....

  18. Conceptual Paper: Digital Preservation Strategies in Archival Institution

    OpenAIRE

    Ismail Adila; Bullah Affandy Habee

    2018-01-01

    In this paper, the overall overview of concept of preservation regardless if it is preservation of physical records/archives or digital records/archives is discussed. The concept of the preservation discussed includes preventive preservation, restorative preservation, and content preservation. Then the concept of digital preservation. Furthermore, this paper highlighted the strategies and methods used in implementing the preservation of digital records/archives. The issues those are involved ...

  19. Mine cross piece

    Energy Technology Data Exchange (ETDEWEB)

    Belik, I P; Gorbatenko, A Ye

    1982-01-01

    The mine cross piece includes main and supplementary parachute-formed cupolas made of air-impermeable fabric, resources for attachment made in the form of shroud lines. In order to improve its reliability with prolonged localization of an underground fire, the cavity between the cupolas connects to the source of fast-hardening material. In this case the cupolas are arranged co-directionally in relation to each other, while the shroud lines of the main are attached to the cupola of the supplemental which is made with perforations.

  20. Robots in mining

    CSIR Research Space (South Africa)

    Green, J

    2010-09-01

    Full Text Available ? • FOG – Fall of ground • Who is at risk? • What is the cost of incident? • What can we do about it? The Robot Potential • Technology • Conclusion © CSIR 2010 Slide 3 Yes Robots can improve mine safety Robot patrols unoccupied areas Generates a... risk map Additional tool Inform miners in making safe © CSIR 2010 Slide 4 Miner Safety Statistics • from DME (2010/03) • March 2010 • 490 000 employed • 400 000 suppliers1 • 9 died, 7 in rockfall incidents 2 • Prior year- March 2010 • 152...

  1. Mining the Home Environment

    Science.gov (United States)

    Cook, Diane J.; Krishnan, Narayanan

    2014-01-01

    Individuals spend a majority of their time in their home or workplace and for many, these places are our sanctuaries. As society and technology advance there is a growing interest in improving the intelligence of the environments in which we live and work. By filling home environments with sensors and collecting data during daily routines, researchers can gain insights on human daily behavior and the impact of behavior on the residents and their environments. In this article we provide an overview of the data mining opportunities and challenges that smart environments provide for researchers and offer some suggestions for future work in this area. PMID:25506128

  2. Mining the Home Environment.

    Science.gov (United States)

    Cook, Diane J; Krishnan, Narayanan

    2014-12-01

    Individuals spend a majority of their time in their home or workplace and for many, these places are our sanctuaries. As society and technology advance there is a growing interest in improving the intelligence of the environments in which we live and work. By filling home environments with sensors and collecting data during daily routines, researchers can gain insights on human daily behavior and the impact of behavior on the residents and their environments. In this article we provide an overview of the data mining opportunities and challenges that smart environments provide for researchers and offer some suggestions for future work in this area.

  3. Knowledge preservation strategies for nuclear power plants

    International Nuclear Information System (INIS)

    Koruna, S.; Bachmann, H.

    2004-01-01

    The nuclear industry is currently facing several challenges. An internal threat to the safety and operations of nuclear power plants is the loss of those employees who hold knowledge that is either critical to operations or safety. This report discusses the possibilities to preserve knowledge in nuclear power plants. Dependent on the degree of tacitness two different knowledge preservation strategies can be discerned: personalization and codification. The knowledge preservation activities discussed are valued according to the criteria: cost, immediacy of availability and completeness

  4. Assessing metal pollution in ponds constructed for controlling runoff from reclaimed coal mines.

    Science.gov (United States)

    Miguel-Chinchilla, Leticia; González, Eduardo; Comín, Francisco A

    2014-08-01

    Constructing ponds to protect downstream ecosystems is a common practice in opencast coal mine reclamation. As these ponds remain integrated in the landscape, it is important to evaluate the extent of the effect of mine pollution on these ecosystems. However, this point has not been sufficiently addressed in the literature. The main objective of this work was to explore the metal pollution in man-made ponds constructed for runoff control in reclaimed opencast coal mines over time. To do so, we evaluated the concentration of ten heavy metals in the water, sediment, and Typha sp. in 16 runoff ponds ranging from 1 to 19 years old that were constructed in reclaimed opencast coal mines of northeastern Spain. To evaluate degree of mining pollution, we compared these data to those from a pit lake created in a local unreclaimed mine and to local streams as an unpolluted reference, as well as comparing toxicity levels in aquatic organisms. The runoff ponds showed toxic concentrations of Al, Cu, and Ni in the water and As and Ni in the sediment, which were maintained over time. Metal concentrations in runoff ponds were higher than in local streams, and macrophytes showed high metal concentrations. Nevertheless, metal concentrations in water and sediment in runoff ponds were lower than those in the pit lake. This study highlights the importance of mining reclamation to preserve the health of aquatic ecosystems and suggests the existence of chronic metal toxicity in the ponds, potentially jeopardizing pond ecological functions and services.

  5. Seafloor massive sulfide deposits support unique megafaunal assemblages: Implications for seabed mining and conservation.

    Science.gov (United States)

    Boschen, Rachel E; Rowden, Ashley A; Clark, Malcolm R; Pallentin, Arne; Gardner, Jonathan P A

    2016-04-01

    Mining of seafloor massive sulfides (SMS) is imminent, but the ecology of assemblages at SMS deposits is poorly known. Proposed conservation strategies include protected areas to preserve biodiversity at risk from mining impacts. Determining site suitability requires biological characterisation of the mine site and protected area(s). Video survey of a proposed mine site and protected area off New Zealand revealed unique megafaunal assemblages at the mine site. Significant relationships were identified between assemblage structure and environmental conditions, including hydrothermal features. Unique assemblages occurred at both active and inactive chimneys and are particularly at risk from mining-related impacts. The occurrence of unique assemblages at the mine site suggests that the proposed protected area is insufficient alone and should instead form part of a network. These results provide support for including hydrothermally active and inactive features within networks of protected areas and emphasise the need for quantitative survey data of proposed sites. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  6. ACHP | Sustainability and Historic Preservation Links

    Science.gov (United States)

    Preservation) Solar Panels Incorporating Solar Panels in a Rehabilitation Project (National Park Service ) Installing Solar Panels on Historic Buildings: A Survey of the Regulatory Environment (Department of Energy

  7. Cosmetic preservative labelling on the Thai market.

    Science.gov (United States)

    Bunyavaree, Monthathip; Kasemsarn, Pranee; Boonchai, Waranya

    2016-04-01

    Preservatives are added to cosmetics and other consumer products to prevent microbial growth and product degradation. Many cosmetic preservatives are skin sensitizers and frequent causes of contact dermatitis. The use of preservatives may vary by country and/or region, according to legislation, and may be reflected in differences in the prevalence rates of preservative allergy worldwide. To examine the type and frequency of preservative use in cosmetics sold in Thai markets in metropolitan Bangkok, Thailand. Preservatives contained in 1000 different cosmetics sold in Thai markets were documented and analysed, based on the labelling of ingredients. Most of the cosmetic and skincare products sold in Thai markets were international brands, with only a small proportion of cosmetic products being produced in Thailand. International brand cosmetics were more likely to contain non-formaldehyde-releasing preservatives than domestically produced brands. Isothiazolinone-based preservatives, which are responsible for the current increase in the prevalence of contact allergy, were found at a significant frequency in domestically produced, leave-on cosmetic products. Preservatives in cosmetics were significantly different according to source of production and type of cosmetics. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. Flexible Bit Preservation on a National Basis

    DEFF Research Database (Denmark)

    Jurik, Bolette; Nielsen, Anders Bo; Zierau, Eld

    2012-01-01

    In this paper we present the results from The Danish National Bit Repository project. The project aim was establishment of a system that can offer flexible and sustainable bit preservation solutions to Danish cultural heritage institutions. Here the bit preservation solutions must include support...... of bit safety as well as other requirements like e.g. confidentiality and availability. The Danish National Bit Repository is motivated by the need to investigate and handle bit preservation for digital cultural heritage. Digital preservation relies on the integrity of the bits which digital material...

  9. Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments

    Directory of Open Access Journals (Sweden)

    Hong Rong

    2017-01-01

    Full Text Available With the advent of big data era, clients who lack computational and storage resources tend to outsource data mining tasks to cloud service providers in order to improve efficiency and reduce costs. It is also increasingly common for clients to perform collaborative mining to maximize profits. However, due to the rise of privacy leakage issues, the data contributed by clients should be encrypted using their own keys. This paper focuses on privacy-preserving k-means clustering over the joint datasets encrypted under multiple keys. Unfortunately, existing outsourcing k-means protocols are impractical because not only are they restricted to a single key setting, but also they are inefficient and nonscalable for distributed cloud computing. To address these issues, we propose a set of privacy-preserving building blocks and outsourced k-means clustering protocol under Spark framework. Theoretical analysis shows that our scheme protects the confidentiality of the joint database and mining results, as well as access patterns under the standard semihonest model with relatively small computational overhead. Experimental evaluations on real datasets also demonstrate its efficiency improvements compared with existing approaches.

  10. Competitiveness of the mining sector

    International Nuclear Information System (INIS)

    Herrera Arango, Jairo; Gamba Saavedra, Gloria Patricia

    2006-01-01

    The paper is based on the upgraded study of the evaluation of competitiveness of the Colombian mining sector, carried out for the UPME, in the year 2005, with base in this study, the conditions were examined offered for Colombia for the mining industry

  11. Mining research for enhanced competitiveness

    CSIR Research Space (South Africa)

    Vogt, D

    2008-11-01

    Full Text Available Mining is very important to South Africa, contributing 7% of GDP directly, and 15% indirectly and employing more than 450 000 people. With the world’s largest resources of gold, platinum and ferrochrome, and major coal resources, mining...

  12. Implications of Emerging Data Mining

    Science.gov (United States)

    Kulathuramaiyer, Narayanan; Maurer, Hermann

    Data Mining describes a technology that discovers non-trivial hidden patterns in a large collection of data. Although this technology has a tremendous impact on our lives, the invaluable contributions of this invisible technology often go unnoticed. This paper discusses advances in data mining while focusing on the emerging data mining capability. Such data mining applications perform multidimensional mining on a wide variety of heterogeneous data sources, providing solutions to many unresolved problems. This paper also highlights the advantages and disadvantages arising from the ever-expanding scope of data mining. Data Mining augments human intelligence by equipping us with a wealth of knowledge and by empowering us to perform our daily tasks better. As the mining scope and capacity increases, users and organizations become more willing to compromise privacy. The huge data stores of the ‚master miners` allow them to gain deep insights into individual lifestyles and their social and behavioural patterns. Data integration and analysis capability of combining business and financial trends together with the ability to deterministically track market changes will drastically affect our lives.

  13. Process Mining Online Assessment Data

    Science.gov (United States)

    Pechenizkiy, Mykola; Trcka, Nikola; Vasilyeva, Ekaterina; van der Aalst, Wil; De Bra, Paul

    2009-01-01

    Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better understanding of the underlying educational processes, for…

  14. Finding Gold in Data Mining

    Science.gov (United States)

    Flaherty, Bill

    2013-01-01

    Data-mining systems provide a variety of opportunities for school district personnel to streamline operations and focus on student achievement. This article describes the value of data mining for school personnel, finance departments, teacher evaluations, and in the classroom. It suggests that much could be learned about district practices if one…

  15. Expansion of Neyveli lignite mines

    Energy Technology Data Exchange (ETDEWEB)

    Kasturi, T S

    1982-06-01

    This paper describes activities at Neyveli lignite mines in the Tamil Nadu region of India. The equipment used, in mining and materials handling is described. Problems encountered in the conveyor transport system are described, and the solutions finally adopted are presented.

  16. Post-mining in France

    International Nuclear Information System (INIS)

    2007-01-01

    This plentifully illustrated book aims at showing how new equilibria are building up during the transition between mining activity and post-mining, and at stressing on the necessity to keep up the cultural elements, the competencies and knowledge of mining works. The first chapter - mine and men - shows the importance of mineral substances in the objects of the everyday life, illustrates the importance of the mining tradition in France and describes the technical and administrative organisation of the end of the mining activity (works, rehabilitation, regulation, monitoring..). Chapter two - exploitation methods - presents the surface and underground facilities and their impact on the environment (extraction machines, workshops, ore processing plants, decantation ponds..). The third chapter deals with the rehabilitation and monitoring aspects: impact of mining activity stoppage on underground and surface waters, land stability, soils cleansing.. The last chapter summarizes the history of French mining region by region: Nord-Pas-de-Calais, Lorraine-Alsace, Massif central, Bretagne-Normandie, Provence-Alpes-Cote d'Azur and Pyrenees

  17. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  18. Process mining online assessment data

    NARCIS (Netherlands)

    Pechenizkiy, M.; Trcka, N.; Vasilyeva, E.; Aalst, van der W.M.P.; De Bra, P.M.E.; Barnes, T.; Desmarais, M.; Romero, C.; Ventura, S.

    2009-01-01

    Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better understanding of

  19. Education Roadmap for Mining Professionals

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2002-12-01

    This document represents the roadmap for education in the U.S. mining industry. It was developed based on the results of an Education Roadmap Workshop sponsored by the National Mining Association in conjunction with the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, Office of Industrial Technologies. The Workshop was held February 23, 2002 in Phoenix, Arizona.

  20. Coal Mine Methane in Russia

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    This paper discusses coal mine methane emissions (CMM) in the Russian Federation and the potential for their productive utilisation. It highlights specific opportunities for cost-effective reductions of CMM from oil and natural gas facilities, coal mines and landfills, with the aim of improving knowledge about effective policy approaches.

  1. Coal mining in Australia

    Energy Technology Data Exchange (ETDEWEB)

    Mills, L J

    1981-12-01

    In 1959 black coal production in Australia totalled some 21.9 million tonnes per annum, 70% of this being produced from underground mines in the coalfields of New South Wales. By 1980 output levels had increased by nearly 350% to 75.4 million tonnes per annum (54% of which was exported) compared with 5% some 20 years earlier. Because it is blessed with large reserves of coal and other forms of energy, it is inevitable that the Australian coal mining industry will be required to play a major role in the development of the international coal market through to the end of the present century. Experts now predict a need for the black coal output in Australia to be developed from its present level to a minimum of 293 million tonnes per annum by the year 2000. This paper examines the present circumstances in the Australian coal industry and attempts to outline the development which has to be undertaken in order to meet the needs of an energy hungry world.

  2. Data mining and education.

    Science.gov (United States)

    Koedinger, Kenneth R; D'Mello, Sidney; McLaughlin, Elizabeth A; Pardos, Zachary A; Rosé, Carolyn P

    2015-01-01

    An emerging field of educational data mining (EDM) is building on and contributing to a wide variety of disciplines through analysis of data coming from various educational technologies. EDM researchers are addressing questions of cognition, metacognition, motivation, affect, language, social discourse, etc. using data from intelligent tutoring systems, massive open online courses, educational games and simulations, and discussion forums. The data include detailed action and timing logs of student interactions in user interfaces such as graded responses to questions or essays, steps in rich problem solving environments, games or simulations, discussion forum posts, or chat dialogs. They might also include external sensors such as eye tracking, facial expression, body movement, etc. We review how EDM has addressed the research questions that surround the psychology of learning with an emphasis on assessment, transfer of learning and model discovery, the role of affect, motivation and metacognition on learning, and analysis of language data and collaborative learning. For example, we discuss (1) how different statistical assessment methods were used in a data mining competition to improve prediction of student responses to intelligent tutor tasks, (2) how better cognitive models can be discovered from data and used to improve instruction, (3) how data-driven models of student affect can be used to focus discussion in a dialog-based tutoring system, and (4) how machine learning techniques applied to discussion data can be used to produce automated agents that support student learning as they collaborate in a chat room or a discussion board. © 2015 John Wiley & Sons, Ltd.

  3. Solution mining process

    International Nuclear Information System (INIS)

    Showalter, W.E.

    1984-01-01

    A solution mining process which may be used for uranium, thorium, vanadium, copper, nickel, molybdenum, rhenium, and selenium is claimed. During a first injection-and-production phase of between 6 months and 5 years, a leaching solution is injected through at least one well into the formation to solubilize the mineral values and form a pregnant liquor. This liquor is recovered through another well. The leaching solution contains sulfuric acid, nitric acid, hydrochloric acid, carbonic acid, an alkali metal carbonate, an alkali metal bicarbonate, ammonium carbonate or ammonium bicarbonate. Subsequently during a first production-only phase of between about 2 weeks and one year, injection of the leaching solution is suspended but pregnant liquor is still recovered. This stage is followed by a second injection-and-production phase of between 6 months and 5 years and a second production-only phase. The mineral values are separated from the pregnant liquor to form a barren liquor. The leaching agent is introduced into this liquor, and the solution is recycled. In a second claim for the solution mining of uranium, dilute carbonic acid is used as the leaching solution. The solution has a pH less than 7 and a bicarbonate ion concentration between about 380 ppm and 1000 ppm. The injection-and-production phase lasts between one and two years and the production only phase takes between one and four months. Carbon dioxide is introduced into the barren liquor to form a dilute carbonic acid solution and the solution is recycled

  4. Real world data mining applications

    CERN Document Server

    Abou-Nasr, Mahmoud; Stahlbock, Robert; Weiss, Gary M

    2014-01-01

    Data mining applications range from commercial to social domains, with novel applications appearing swiftly; for example, within the context of social networks. The expanding application sphere and social reach of advanced data mining raise pertinent issues of privacy and security. Present-day data mining is a progressive multidisciplinary endeavor. This inter- and multidisciplinary approach is well reflected within the field of information systems. The information systems research addresses software and hardware requirements for supporting computationally and data-intensive applications. Furthermore, it encompasses analyzing system and data aspects, and all manual or automated activities. In that respect, research at the interface of information systems and data mining has significant potential to produce actionable knowledge vital for corporate decision-making. The aim of the proposed volume is to provide a balanced treatment of the latest advances and developments in data mining; in particular, exploring s...

  5. Introduction to Space Resource Mining

    Science.gov (United States)

    Mueller, Robert P.

    2013-01-01

    There are vast amounts of resources in the solar system that will be useful to humans in space and possibly on Earth. None of these resources can be exploited without the first necessary step of extra-terrestrial mining. The necessary technologies for tele-robotic and autonomous mining have not matured sufficiently yet. The current state of technology was assessed for terrestrial and extraterrestrial mining and a taxonomy of robotic space mining mechanisms was presented which was based on current existing prototypes. Terrestrial and extra-terrestrial mining methods and technologies are on the cusp of massive changes towards automation and autonomy for economic and safety reasons. It is highly likely that these industries will benefit from mutual cooperation and technology transfer.

  6. The hydrogen mine introduction initiative

    Energy Technology Data Exchange (ETDEWEB)

    Betournay, M.C.; Howell, B. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Mining and Mineral Sciences Laboratories

    2009-07-01

    In an effort to address air quality concerns in underground mines, the mining industry is considering the use fuel cells instead of diesel to power mine production vehicles. The immediate issues and opportunities associated with fuel cells use include a reduction in harmful greenhouse gas emissions; reduction in ventilation operating costs; reduction in energy consumption; improved health benefits; automation; and high productivity. The objective of the hydrogen mine introduction initiative (HMII) is to develop and test the range of fundamental and needed operational technology, specifications and best practices for underground hydrogen power applications. Although proof of concept studies have shown high potential for fuel cell use, safety considerations must be addressed, including hydrogen behaviour in confined conditions. This presentation highlighted the issues to meet operational requirements, notably hydrogen production; delivery and storage; mine regulations; and hydrogen behaviour underground. tabs., figs.

  7. Filamentous hydrous ferric oxide biosignatures in a pipeline carrying acid mine drainage at Iron Mountain Mine, California

    Science.gov (United States)

    Williams, Amy J.; Alpers, Charles N.; Sumner, Dawn Y.; Campbell, Kate M.

    2017-01-01

    A pipeline carrying acidic mine effluent at Iron Mountain, CA, developed Fe(III)-rich precipitate caused by oxidation of Fe(II)aq. The native microbial community in the pipe included filamentous microbes. The pipe scale consisted of microbial filaments, and schwertmannite (ferric oxyhydroxysulfate, FOHS) mineral spheres and filaments. FOHS filaments contained central lumina with diameters similar to those of microbial filaments. FOHS filament geometry, the geochemical environment, and the presence of filamentous microbes suggest that FOHS filaments are mineralized microbial filaments. This formation of textural biosignatures provides the basis for a conceptual model for the development and preservation of biosignatures in other environments.

  8. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  9. Fertility Preservation for Transgender Adolescents.

    Science.gov (United States)

    Chen, Diane; Simons, Lisa; Johnson, Emilie K; Lockart, Barbara A; Finlayson, Courtney

    2017-07-01

    To describe fertility preservation (FP) utilization by transgender adolescents within a pediatric gender clinic between July 2013 and July 2016. A retrospective chart review was conducted to abstract demographic and clinical information among adolescents initiating gender-affirming hormones, including patient age at initial FP consultation, birth-assigned sex, race/ethnicity, and outcome of FP consultation. In our sample of 105 transgender adolescents, a total of 13 (seven transgender men and six transgender women) between the age of 14.2 and 20.6 years were seen in formal consultation for FP before initiating hormones. Of these adolescents, four completed sperm cryopreservation and one completed oocyte cryopreservation. Rates of FP utilization among transgender youth were low, which is consistent with a recently published report of FP utilization among transgender youth at another pediatric institution. Identified barriers to FP in our sample included cost, invasiveness of procedures, and desire not to delay medical transition. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  10. Preserving Data for Renewable Energy

    Science.gov (United States)

    Macduff, M.; Sivaraman, C.

    2017-12-01

    The EERE Atmosphere to Electrons (A2e) program established the Data Archive and Portal (DAP) to ensure the long-term preservation and access to A2e research data. The DAP has been operated by PNNL for 2 years with data from more than a dozen projects and 1PB of data and hundreds of datasets expected to be stored this year. The data are a diverse mix of model runs, observational data, and dervived products. While most of the data is public, the DAP has securely stored many proprietary data sets provided by energy producers that are critical to the research goals of the A2e program. The DAP uses Amazon Web Services (AWS) and PNNL resources to provide long-term archival and access to the data with appropriate access controls. As a key element of the DAP, metadata are collected for each dataset to assist with data discovery and usefulness of the data. Further, the DAP has begun a process of standardizing observation data into NetCDF, which allows users to focus on the data instead of parsing the many formats. Creating a central repository that is in tune with the unique needs of the A2e research community is helping active tasks today as well as making many future research efforts possible. In this presentation, we provide an overview the DAP capabilities and benefits to the renewable energy community.

  11. Food preservation by ionising radiation

    International Nuclear Information System (INIS)

    Andrade, M. E.

    1996-01-01

    The process of food preservation by ionising radiation is an alternative, or a complement, to the traditional methods of heating, refrigerating, freezing or using chemical additives. The study and development of this technique has started on the beginning of the fifties but it is based on the radiation killing effect on micro-organisms discovered by the end of last century. Foodstuffs are treated in appropriate plants: isotopic facilities (gamma radiation) and accelerated electron beams produced by machines called accelerators. The FAO and WHO in close cooperation with the IAEA have played an important role on the development of the process and on the increment of the industrial application of food irradiation. Over the world there are about 37 countries trading foods treated by ionising radiation. However, governments have been slow to clear the utilization of this process. The main reason of this attitude is in general due to the fact that the advantages of the technique are not clearly understood. Therefore, the dissemination of the information could on one hand clarify who has to take decisions and on the other hand support the choice of those foods by the consumers. This is the unique way to dynamize the application of this process

  12. Endothelial cell preservation at hypothermic to normothermic conditions using clinical and experimental organ preservation solutions

    NARCIS (Netherlands)

    Post, Ivo C. J. H.; de Boon, Wadim M. I.; Heger, Michal; van Wijk, Albert C. W. A.; Kroon, Jeffrey; van Buul, Jaap D.; van Gulik, Thomas M.

    2013-01-01

    Endothelial barrier function is pivotal for the outcome of organ transplantation. Since hypothermic preservation (gold standard) is associated with cold-induced endothelial damage, endothelial barrier function may benefit from organ preservation at warmer temperatures. We therefore assessed

  13. Stellar Spectral Classification with Locality Preserving Projections ...

    Indian Academy of Sciences (India)

    School of Computer and Control Engineering, North University of China,. Taiyuan 030051 ... (2013) was used to mine the association rules of a stellar ... of the graph, we then compute a transformation matrix which maps the data points to.

  14. Anuran artifacts of preservation: 27 years later

    Directory of Open Access Journals (Sweden)

    Jessica L. Deichmann

    2009-07-01

    Full Text Available Measurements made on preserved anuran specimens are often used in studies of systematics, ecology and evolution. Here, we examine the effect of preservation on one of the most common measurement of frogs, snout-urostyle length (SUL. Preservation had significanteffects on the SUL of 13 of the 14 species of North American frogs included in this study, with all species decreasing in SUL by 0.31-5.62%. Smaller frog species did not shrink proportionally more or less than larger species. Absolute shrinkage was correlated with SUL and was greater in larger species. Within species, percent shrinkage was not significantly correlated with SUL in 10 species, but significantly greater for larger individuals in 3 species, and decreased with size in 1 species. Absolute shrinkage was statistically greater for larger individuals in 4 species. Our results agree with studies of morphological permutations in fish which show that most preservation-related changes take place within the first few months after initial preservation. We suggest that the potential consequences of using preserved specimens in research must be considered and that future studies continue to examine preservation effects, not only on frogs, but on all preserved specimens used in scientific investigations.

  15. Film sound in preservation and presentation

    NARCIS (Netherlands)

    Campanini, S.

    2014-01-01

    What is the nature of film sound? How does it change through time? How can film sound be conceptually defined? To address these issues, this work assumes the perspective of film preservation and presentation practices, describing the preservation of early sound systems, as well as the presentation

  16. Corn, alfalfa and grass silage preservation principles

    Science.gov (United States)

    Ensiling is the primary means of preserving moist forages for feeding livestock. In ensiling, the crop is stored anaerobically, and sugars in the crop are fermented by lactic acid bacteria naturally on the crop. The crop is preserved by the combination of the acids produced by the lactic acid bacter...

  17. Survey of postharvest handling, preservation and processing ...

    African Journals Online (AJOL)

    Survey of postharvest handling, preservation and processing practices along the camel milk chain in Isiolo district, Kenya. ... Despite the important contribution of camel milk to food security for pastoralists in Kenya, little is known about the postharvest handling, preservation and processing practices. In this study, existing ...

  18. 7 CFR 782.14 - Identity preservation.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Identity preservation. 782.14 Section 782.14 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF... § 782.14 Identity preservation. (a) The importer and all subsequent buyers of the imported wheat shall...

  19. 20 CFR 638.304 - Historical preservation.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Historical preservation. 638.304 Section 638.304 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR JOB CORPS PROGRAM... § 638.304 Historical preservation. The Job Corps Director shall review the “National Register of...

  20. Home Food Preservation Training for Extension Educators

    Science.gov (United States)

    Goard, Linnette Mizer; Hill, Melinda; Shumaker, Katharine; Warrix, Marisa

    2013-01-01

    During times of economic downturn, there has been an increased interest in home food preservation. As the primary resource for current research-based recommendations, a team of Extension Family and Consumer Sciences educators with specialization in food safety and food preservation responded to this demand by developing a standardized food…