We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Chapter 3 highlights several instances of State practice where the reciprocity paradigm continues to influence belligerent reprisals. Its bearing emerges from those formalizations of the mechanism that stress the purpose of restoring the balance in rights and obligations unduly disturbed by a breach of the laws of armed conflict. The chapter will first retrace this interest in several positions expressed by States before, during, and in the aftermath of the Geneva Diplomatic Conference that led to the adoption of the 1977 Additional Protocols to the 1949 Geneva Conventions. It will then focus on the provisions of military manuals, with a particular focus on US practice and the latest Department of Defense Law of War Manual. Finally, it will provide an extensive and, under many respects, unprecedented analysis of the Italian case-law on World War II atrocities: this judicial practice, which has been revived only recently, has brought to the fore several elements that are strongly associated with reciprocity. The chapter will thus highlight notable examples in which the reciprocity paradigm contributes to defining the purpose and function of belligerent reprisals.
This chapter provides the tools to compute catastrophe (CAT) risk, which represents a compound measure of the likelihood and magnitude of adverse consequences affecting structures, individuals, and valuable assets. The process consists of first establishing an inventory of assets (here real or simulated) exposed to potential hazards (exposure module). Estimating the expected damage resulting from a given hazard load (according to Chapter 2) is the second crucial step in the assessment process (vulnerability module). The application of damage functions to exposure data forms the basis for calculating loss estimates (loss module). To ensure consistency across perils, the mean damage ratio is used as the main measure for damage footprints D(x,y), with the final loss footprints simply expressed as L(x,y) = D(x,y) × ν(x,y), where ν(x,y) represents the exposure footprint. Damage functions are provided for various hazard loads: blasts (explosions and asteroid impacts), earthquakes, floods, hail, landslides, volcanic eruptions, and wind.
This chapter outlines the action of passing off. It discusses whether goodwill is a thing (the metaphysical question) and whether passing off enables businesses to own goodwill (the conceptual question).
As we have already seen, there are three basic elements to a successful action in negligence:
(1) a duty to take reasonable care owed by the defendant to the plaintiff
(2) a breach of that duty of care by the defendant
(3) damage resulting to the plaintiff from that breach.
This chapter deals with the third element. This stage involves taking (yet again) three steps:
(1) Identify the damage having an adverse effect on the plaintiff to be recognised by law as damage for which compensation can be sought.
(2) Link the defendant’s conduct (act or omission) to the damage suffered by the plaintiff.
(3) Establish the scope of the defendant’s liability or, putting it differently, establish the extent to which the defendant should be found liable for the harm suffered by the plaintiff OR the type of harm suffered was within the scope of foreseeability.
Viscoelastic theory is introduced, using ice as the material under consideration. Linear theory is first introduced, based on elasticity of the springs and on linear viscosity of the dashpots. The nonlinearity of the dashpots in modelling ice deformation is then introduced. The “crushed layer” and analysis by Kheisin and co-workers is outlined, based on linearly viscous modelling. Kelvin and Burgers models are introduced. Microstructural change is modelled using damage mechanics and state variables for material points. Stress and strain re-distribution arises from this aspect, as well as from nonlinearity with stress. Schaperys modified superposition principle is introduced.
Recent observations are summarized, in which it has been found that in compressive ice failure, zones of high-pressure form with pressures locally as high as 70 MPa. Various aspects of ice behaviour are summarized: creep, fracture, recrystallization, and the development of microstructurally modified layers of ice. Pressure melting is described, whereby the melting temperature decreases with accompanying hydrostatic pressure. The importance of fracture and spalling in the development of high-pressure zones is emphasized. The use of mechanics in analysis of ice failure is discussed.
The Appendix contains an outline of the development of Biot-Schapery theory based on the thermodynamics of irreversible processes. A brief biography of R. A. Schapery is followed by an exposition of the theory, the use of the modified superposition theory, and the use of J integral to deal with damage processes.
Featuring real-world examples and practical methodology, this rigorous text explores time dependence in the mechanics of ice. Emphasizing use of full scale data, and implementing risk-based design methods, mechanical theory is combined with design and modelling. Readers will gain understanding of fundamental concepts and modern advances of ice mechanics and ice failure processes, analysis of field data, and use of probabilistic design methods, with applications to the interaction of ships and offshore structures with thick ice features or icebergs. The book highlights the use of viscoelastic theory, including nonlinearity with stress and the effects of microstructural change, in the mechanics of ice failure and fracture. The methods of design focus on risk analysis, with emphasis on rational limit-state principles and safety. Full discussion of historical discoveries and modern advances – including Hans Island, Molikpak, and others – support up-to-date methods and models to make this an ideal resource for designers and researchers.
The infestation of the fall armyworm (FAW), Spodoptera frugiperda (J.E. Smith) (Lepidoptera: Noctuidae) in Africa since 2016 has been a major threat to maize production. Previous studies in Togo and Ghana from 2016 to 2018 did not correlate FAW infestation to yield losses. Thus, the aim of this study which assesses the impact of FAW infestation by inspecting 150 maize farms throughout the five Agro-Ecological Zones (AEZs) of Togo for FAW plant damage, and third instar larvae were used to infest 10-day-old maize plants in netted plots under controlled conditions at an experiment station (Station d'Expérimentations Agronomiques de Lomé) in 2019 and 2020. As control plots at the experiment station, plots were both netted and treated with emamectin benzoate, simply netted, or open to natural infestation. The number of larvae, egg masses, percent damaged plants, and damage proportions of leaves and ears were scored until harvest. Infestations and damages on maize plant throughout Togo were similar between the two years but were higher in the southern part of the county (AEZ5). At the experiment station, the yield losses were significantly considerable and increased from 25% infestation. The losses were 0.37 t ha−1 for 25% infestation, 0.34 t ha−1 for 30%, 0.59 t ha−1 for the open plots, 0.70 t ha−1 for simple netted and 50% infestation, 1.03 t ha−1 for 75%, and 1.27 t ha−1 for 100% infestation. This current study suggested thorough inspection on maize farms to set off management practices from 25% of infestation.
Damage accumulation and rupture of network materials are discussed in this chapter. The chapter is divided into two parts addressing the rupture of networks without and with pre-existing defects. The relation between the network structure and the strength and ductility of materials without pre-existing cracks is defined, and examples from gels, cellulose networks, and nonwovens are provided. The effect of the fiber tortuosity, fiber aspect ratio, fiber preferential alignment, and the variability of fiber and crosslink properties on network strength is discussed. As in other materials, the size effect on strength is important in Network materials and a section is dedicated to statistical aspects of the strength. Failure under multiaxial loading conditions is compared with failure in uniaxial tension. The second part of the chapter presents an analysis of the propagation of cracks in networks. Pronounced notch insensitivity is observed in many materials and numerous examples are presented. Special attention is given to toughness and guidelines are provided to assist the toughening of quasi-brittle Network materials. A subsection is dedicated to the strength, toughness, and fatigue resistance of elastomers and gels.
This work is concerned with damage detection in a commercial 52-meter wind turbine blade during fatigue testing. Different artificial damages are introduced in the blade in the form of laminate cracks. The lengths of the damages are increased manually, and they all eventually propagate and develop into delaminations during fatigue loading. Strain gauges, acoustic emission sensors, distributed accelerometers, and an active vibration monitoring system are used to track different physical responses in healthy and damaged states of the blade. Based on the recorded data, opportunities and limitations of the different sensing systems for blade structural health monitoring are investigated.
In Chapter 3 of Community Disaster Recovery: Moving from Vulnerability to Resilience, the disaster damage from Colorado's 2013 floods is examined. The extent and type of damage that communities experience during a disaster is linked to the recovery processes, resources, and outcomes that communities experience. Understanding the damage incurred by communities underlies the analysis presented in the rest of the book.
In Chapter 4 of Community Disaster Recovery: Moving from Vulnerability to Resilience, the role that variation in resources plays in disaster recovery are analyzed. Resources are categorized as existing capacity the local government had prior to the flood and in-flow of external resources during and after emergency response. This chapter explores the resources that Colorado communities had available to them before the flood and how the disaster affected their resources afterwards. Specifically, the pre-existing capacity of communities to withstand such events is explored. In the wake of a disaster, a community’s resources, including financial, technical, administrative, and civic capacity, may propel a community towards more resilient recovery or, alternatively, may constrain the actions taken to rebuild and recover from a disaster. This chapter integrates and clarifies how resources and resource mobilization may influence post-disaster policy change and learning at the local level.
While land improvement is a commonplace theme in Scott’s writing, this chapter looks at counternarratives in which he foregrounds negative environmental impact. Literary forms that are discussed include elegy and gothic. Theories used include ecogothic and ecophobia. Species loss is shown to memorialize the untimeliness of war deaths. Case studies look at environments in which evidence of cruelty, including violence against the land, refuses to be buried or, conversely, remains manifest in the form of depletion and absence. Scott’s most disturbing fiction often features trees and other plants that have been mutilated, grow unusually and in strange places, or do not grow at all. The effect is a disruption of places more usually understood to be reliable, familiar or homely. The chapter demonstrates how Scott shows aesthetics commonplace to Romantic thought to be destabilized by what grows or fails to grow, creating uneasy and uncanny ecologies.
Duty of care in an educational context is concerned with the safety and wellbeing of students. It is a term we hear all the time in schools. It is imperative to have a clear understanding and working knowledge of when and where the duty is owed and where it is not. Duty of care is part of the tort of negligence where typically a student becomes injured on school grounds or at a school event and his or her family wants to seek a remedy. This is usually in the form of financial compensation for the loss suffered and for any ongoing treatment costs. The circumstances in which a plaintiff is likely to proceed and win a case in the tort of negligence is now well established in law. This chapter discusses the duty of care and how it operates in schools. The discussion covers the defences used by schools to reduce or avoid their responsibility in such matters. The second half of the chapter outlines several of the significant judicial cases in school law, highlighting what they have decided about the liability and legal position of schools and school authorities.
In Japan, the brown bear (Ursus arctos) occurs only in Hokkaido. With recent increase and range expansion of the bear population, conflicts among people and bears, as well as the number of control bear kills, have also increased. Recently, bear intrusions into urban areas, such as Sapporo City, as well as agricultural damage to corn and fruits, have increased in various parts of Hokkaido, although there has been little livestock damage. The number of bear kills has increased from 200 to 300 per year in the 1990s to over 850 by 2010. The purpose of >90% of recent kills was damage control. The average cost of annual agricultural damage and number of bear kills between 2010 and 2017 were 13.7 and 679 million yen, respectively. In this chapter, the current situation of bear management issues in Hokkaido is presented, including the paradigm of Brown Bear Management Plan of Hokkaido, urban bear management in Sapporo, and the human resource development and management system to develop proper brown bear management
The thickness effect has a significant influence on the fatigue life of micro–nanometer thin films. Due to the increasing application of micro–nanometer thin films in the field of microelectronics, a suitable fatigue prediction model is urgently needed. To reveal the impact of the thickness effect on the fatigue life of a copper wire film, cyclic tension fatigue test of four groups of copper wire films were carried out. Based on the theory of continuous damage mechanics and damage homogenization method, a fatigue damage accumulation model that considered the film thickness was proposed. Based on the proposed fatigue damage prediction model, the damage evolution law and fatigue life of copper wire films with different thickness and strain range were predicted. Furthermore, the size effect of the copper films was analyzed. The results showed that the fatigue life of copper wire films will decrease with the increase of thickness and strain amplitude; the thinner the film, the more significant the thickness effect on the fatigue life is; with the increase of the film thickness, the film thickness effect will gradually decrease.
This study revealed that the mass ratio of large anisometric particles (platelets) to ultrafine, equiaxed particles strongly influences dynamic and quasistatic compressive response and the process of damage evolution in ice-templated alumina materials. The improved sinterability between particles of significantly dissimilar size and morphology enabled the utilization of a high mass ratio of the particles in harnessing a markedly enhanced level of strength in highly porous ice-templated ceramics. The high volume fraction of platelets increased lamellar bridge density and resulted in dendritic morphology as opposed to lamellar morphology without platelets. All the materials showed strain rate-sensitivity, where strength increased with strain rate. Materials with highly dendritic morphology exhibited the best performance in terms of maximum strength and energy absorption capacity, and the performance improved from quasistatic to dynamic regime. Direct observation of the process of damage evolution revealed the effects of both strain rate and ratio of platelets to ultrafine particles.
Broken and damaged Bronze Age metalwork has long been studied, but there is no methodology for identifying signs of intentional versus unintentional action. Past approaches have tended to rely on assumptions about how such finds were damaged. Drawing on the material properties of copper alloys, as well as on recent research into wear-analysis and experimental fragmentation of bronze implements, this article presents a working methodology for identifying deliberate damage. Seven ‘Destruction Indicators’ are presented, with associated criteria, for making informed interpretations about archaeological artefacts. These contribute to a ‘Damage Ranking System’, an index for ranking damage on Bronze Age copper alloy objects based on the likelihood that damage was intentional. Two case studies illustrate how this system can be applied.
The existence of secondary rules of responsibility stems from two cumulative elements: a breach of an international obligation and the attribution of this breach to a State. The present chapter analyses the obligations owed by the State responsible for a cyber operation against another State: firstly, if the cyber operation has a continuing character, the responsible State is under the obligation to cease the operation; secondly, the responsible State may have to offer assurances and guarantees of non-repetition if required by the circumstances of the case; and thirdly, the responsible State has to repair the injury resulting from the cyber operation. Finally, it is necessary to examine the question of shared responsibility, which is applicable when multiple States are involved in the cyber operation.