期刊文献+
共找到171,191篇文章
< 1 2 250 >
每页显示 20 50 100
Sustainable Mining in the Era of Artificial Intelligence 被引量:1
1
作者 Long Chen Yuting Xie +2 位作者 Yutong Wang Shirong Ge Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期1-4,共4页
The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are... The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are revolutionizing mining through robotic and data-driven innovations[4]-[7].While AI offers mining industry advantages,it is crucial to acknowledge the potential risks associated with its widespread use.Over-reliance on AI may lead to a loss of human control over mining operations in the future,resulting in unpredictable consequences. 展开更多
关键词 SUSTAINABLE mining consequences
下载PDF
PHUI-GA: GPU-based efficiency evolutionary algorithm for mining high utility itemsets
2
作者 JIANG Haipeng WU Guoqing +3 位作者 SUN Mengdan LI Feng SUN Yunfei FANG Wei 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期965-975,共11页
Evolutionary algorithms(EAs)have been used in high utility itemset mining(HUIM)to address the problem of discover-ing high utility itemsets(HUIs)in the exponential search space.EAs have good running and mining perform... Evolutionary algorithms(EAs)have been used in high utility itemset mining(HUIM)to address the problem of discover-ing high utility itemsets(HUIs)in the exponential search space.EAs have good running and mining performance,but they still require huge computational resource and may miss many HUIs.Due to the good combination of EA and graphics processing unit(GPU),we propose a parallel genetic algorithm(GA)based on the platform of GPU for mining HUIM(PHUI-GA).The evolution steps with improvements are performed in central processing unit(CPU)and the CPU intensive steps are sent to GPU to eva-luate with multi-threaded processors.Experiments show that the mining performance of PHUI-GA outperforms the existing EAs.When mining 90%HUIs,the PHUI-GA is up to 188 times better than the existing EAs and up to 36 times better than the CPU parallel approach. 展开更多
关键词 high utility itemset mining(huim) graphics process-ing unit(GPU)parallel genetic algorithm(GA) mining perfor-mance
下载PDF
Instability mechanism of mining roadway passing through fault at different angles in kilometre-deep mine and control measures of roof cutting and NPR cables 被引量:2
3
作者 SUN Xiaoming WANG Jian +6 位作者 ZHAO Wenchao MING Jiang ZHANG Yong LI Zhihu MIAO Chengyu GUO Zhibiao HE Manchao 《Journal of Mountain Science》 SCIE CSCD 2024年第1期236-251,共16页
The angle α between the fault strike and the axial direction of the roadway produces different damage characteristics. In this paper, the research methodology includes theoretical analyses, numerical simulations and ... The angle α between the fault strike and the axial direction of the roadway produces different damage characteristics. In this paper, the research methodology includes theoretical analyses, numerical simulations and field experiments in the context of the Daqiang coal mine located in Shenyang, China. The stability control countermeasure of "pre-splitting cutting roof + NPR anchor cable"(PSCR-NPR) is simultaneously proposed. According to the different deformation characteristics of the roadway, the faults are innovatively classified into three types, with α of type I being 0°-30°, α of type II being 30°-60°, and α of type III being 60°-90°. The full-cycle stress evolution paths during mining roadway traverses across different types of faults are investigated by numerical simulation. Different pinch angles α lead to high stress concentration areas at different locations in the surrounding rock. The non-uniform stress field formed in the shallow surrounding rock is an important reason for the instability of the roadway. The pre-cracked cut top shifted the high stress region to the deep rock mass and formed a low stress region in the shallow rock mass. The high prestressing NPR anchor cable transforms the non-uniform stress field of the shallow surrounding rock into a uniform stress field. PSCR-NPR is applied in the fault-through roadway of Daqiang mine. The low stress area of the surrounding rock was enlarged by 3-7 times, and the cumulative convergence was reduced by 45%-50%. It provides a reference for the stability control of the deep fault-through mining roadway. 展开更多
关键词 Kilometre-deep mine Fault mining roadway Failure mechanism Pre-splitting cutting roof High pre-stress NPR anchor cable
下载PDF
Spatiotemporal deformation characteristics of Outang landslide and identification of triggering factors using data mining 被引量:1
4
作者 Beibei Yang Zhongqiang Liu +1 位作者 Suzanne Lacasse Xin Liang 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第10期4088-4104,共17页
Since the impoundment of Three Gorges Reservoir(TGR)in 2003,numerous slopes have experienced noticeable movement or destabilization owing to reservoir level changes and seasonal rainfall.One case is the Outang landsli... Since the impoundment of Three Gorges Reservoir(TGR)in 2003,numerous slopes have experienced noticeable movement or destabilization owing to reservoir level changes and seasonal rainfall.One case is the Outang landslide,a large-scale and active landslide,on the south bank of the Yangtze River.The latest monitoring data and site investigations available are analyzed to establish spatial and temporal landslide deformation characteristics.Data mining technology,including the two-step clustering and Apriori algorithm,is then used to identify the dominant triggers of landslide movement.In the data mining process,the two-step clustering method clusters the candidate triggers and displacement rate into several groups,and the Apriori algorithm generates correlation criteria for the cause-and-effect.The analysis considers multiple locations of the landslide and incorporates two types of time scales:longterm deformation on a monthly basis and short-term deformation on a daily basis.This analysis shows that the deformations of the Outang landslide are driven by both rainfall and reservoir water while its deformation varies spatiotemporally mainly due to the difference in local responses to hydrological factors.The data mining results reveal different dominant triggering factors depending on the monitoring frequency:the monthly and bi-monthly cumulative rainfall control the monthly deformation,and the 10-d cumulative rainfall and the 5-d cumulative drop of water level in the reservoir dominate the daily deformation of the landslide.It is concluded that the spatiotemporal deformation pattern and data mining rules associated with precipitation and reservoir water level have the potential to be broadly implemented for improving landslide prevention and control in the dam reservoirs and other landslideprone areas. 展开更多
关键词 LANDSLIDE Deformation characteristics Triggering factor Data mining Three gorges reservoir
下载PDF
The influence of inter-band rock on rib spalling in longwall panel with large mining height 被引量:1
5
作者 Jiachen Wang Meng Li +3 位作者 Zhaohui Wang Zheng Li Han Zhang Shixiong Song 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2024年第4期427-442,共16页
In order to improve rib stability,failure criteria and instability mode of a thick coal seam with inter-band rock layer are analysed in this study.A three-dimensional mechanical model is established for the rib by con... In order to improve rib stability,failure criteria and instability mode of a thick coal seam with inter-band rock layer are analysed in this study.A three-dimensional mechanical model is established for the rib by considering the rock layer.A safety factor is defined foy the rib,and it is observed that the safety factor exhibits a positive correlation with the thickness and strength of the inter-band rock.A calculation method for determining critical parameters of the rock layer is presented to ensure the rib stability.It is revealed that incomplete propagation of the fracture at the hard rock constitutes a fundamental prerequisite for ensuring the rib stability.The influence of the position of the inter-band rock in the coal seam on failure mechanism of the rib was thoroughly investigated by developing a series of physical models for the rib at the face area.The best position for the inter-band rock in the coal seam is at a height of 1.5 m away from the roof line,which tends to provide a good stability state for the rib.For different inter-band rock positions,two ways of controlling rib by increasing supports stiffness and flexible grouting reinforcement are proposed. 展开更多
关键词 Rib spalling Inter-band rock Large mining height Limit analysis Physical model experiment Numerical simulation
下载PDF
InSAR-derived surface deformation characteristics and mining subsidence parameters in mountain coal mines
6
作者 JIANG Xiaowei SHI Wenbing +2 位作者 LIANG Feng GUI Jingjing LI Jiawei 《Journal of Mountain Science》 SCIE CSCD 2024年第9期3139-3156,共18页
Mining-induced surface deformation disrupts ecological balance and impedes economic progress.This study employs SBAS-InSAR with 107-view of ascending and descending SAR data from Sentinel-1,spanning February 2017 to S... Mining-induced surface deformation disrupts ecological balance and impedes economic progress.This study employs SBAS-InSAR with 107-view of ascending and descending SAR data from Sentinel-1,spanning February 2017 to September 2020,to monitor surface deformation in the Fa’er Coal Mine,Guizhou Province.Analysis on the surface deformation time series reveals the relationship between underground mining and surface shifts.Considering geological conditions,mining activities,duration,and ranges,the study determines surface movement parameters for the coal mine.It asserts that mining depth significantly influences surface movement parameters in mountainous mining areas.Increasing mining depth elevates the strike movement angle on the deeper side of the burial depth by 22.84°,while decreasing by 7.74°on the shallower side.Uphill movement angles decrease by 4.06°,while downhill movement angles increase by 15.71°.This emphasizes the technology's suitability for local mining design,which lays the groundwork for resource development,disaster prevention,and ecological protection in analogous contexts. 展开更多
关键词 Time-series InSAR Surface deformation Subsurface mining mining subsidence
下载PDF
A Quarterly High RFM Mining Algorithm for Big Data Management
7
作者 Cuiwei Peng Jiahui Chen +1 位作者 Shicheng Wan Guotao Xu 《Computers, Materials & Continua》 SCIE EI 2024年第9期4341-4360,共20页
In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf ava... In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior.RFM(recency,frequency,andmonetary)patternmining is a powerful tool to evaluate the value of customer behavior.However,the existing RFM patternmining algorithms do not consider the quarterly nature of goods,resulting in unreasonable shelf availability and difficulty in profit-making.To solve this problem,we propose a quarterly RFM mining algorithmfor On-shelf products named OS-RFM.Our algorithmmines the high recency,high frequency,and high monetary patterns and considers the period of the on-shelf goods in quarterly units.We conducted experiments using two real datasets for numerical and graphical analysis to prove the algorithm’s effectiveness.Compared with the state-of-the-art RFM mining algorithm,our algorithm can identify more patterns and performs well in terms of precision,recall,and F1-score,with the recall rate nearing 100%.Also,the novel algorithm operates with significantly shorter running times and more stable memory usage than existing mining algorithms.Additionally,we analyze the sales trends of products in different quarters and seasonal variations.The analysis assists businesses in maintaining reasonable on-shelf availability and achieving greater profitability. 展开更多
关键词 Data mining recency pattern high-utility itemset RFM pattern mining on-shelf management
下载PDF
Preface:Heavy metal(loid)s at mining&metallurgical sites:Fate,risk and remediation
8
作者 薛生国 李楚璇 +1 位作者 赵东叶 吴川 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第4期1033-1035,共3页
The contamination of heavy metal(loid)s at mining&metallurgical sites has been a major environmental challenge worldwide[1].Typically,large amounts of metal(loid)s-bearing wastes are generated at these sites,such ... The contamination of heavy metal(loid)s at mining&metallurgical sites has been a major environmental challenge worldwide[1].Typically,large amounts of metal(loid)s-bearing wastes are generated at these sites,such as smelting slag,combustion residues,mine tailings,wastewater,and exhaust gas[2].Due to their high mobility in the environment,the released heavy metal(loid)s can easily enter the soil and water environment,posing long-term and widespread threats to ecological and human health[3]. 展开更多
关键词 mining WASTEWATER SMELTING
下载PDF
Using X Social Networks (formerly Twitter) and web news mining to predict the measles outbreak
9
作者 Kia Jahanbin Mohammad Jokar Vahid Rahmanian 《Asian Pacific Journal of Tropical Medicine》 SCIE CAS 2024年第4期188-190,共3页
Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms suc... Measles,an infectious disease caused by the measles virus,remains a significant public health concern worldwide due to its highly contagious nature and potential for severe complications[1].In addition to symptoms such as high fever,cough,Koplik spots,and rash,measles can lead to serious complications including pneumonia and myocarditis,particularly in vulnerable populations such as young children[1,2]. 展开更多
关键词 TWITTER WEB mining
下载PDF
Integrated biomarker response to assess toxic impacts of iron and manganese on deep-sea mussel Gigantidas platifrons under a deep-sea mining activity scenario
10
作者 Li ZHOU Mengna LI +7 位作者 Zhaoshan ZHONG Minxiao WANG Hao CHEN Chao LIAN Hao WANG Huan ZHANG Lei CAO Chaolun LI 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2024年第2期522-532,共11页
Deep-sea mining activities can potentially release metals,which pose a toxicological threat to deep-sea ecosystems.Nevertheless,due to the remoteness and inaccessibility of the deep-sea biosphere,there is insufficient... Deep-sea mining activities can potentially release metals,which pose a toxicological threat to deep-sea ecosystems.Nevertheless,due to the remoteness and inaccessibility of the deep-sea biosphere,there is insufficient knowledge about the impact of metal exposure on its inhabitants.In this study,deep-sea mussel Gigantidas platifrons,a commonly used deep-sea toxicology model organism,was exposed to manganese(100,1000μg/L)or iron(500,5000μg/L)for 7 d,respectively.Manganese and iron were chosen for their high levels of occurrence within deep-sea deposits.Metal accumulation and a battery of biochemical biomarkers related to antioxidative stress in superoxide dismutase(SOD),catalase(CAT),malondialdehyde(MDA);immune function in alkaline phosphatase(AKP),acid phosphatase(ACP);and energy metabolism in pyruvate kinase(PK)and hexokinase(HK)were assessed in mussel gills.Results showed that deep-sea mussel G.platifrons exhibited a high capacity to accumulate Mn/Fe.In addition,most tested biochemical parameters were altered by metal exposure,demonstrating that metals could induce oxidative stress,suppress the immune system,and affect energy metabolism of deep-sea mussels.The integrated biomarker response(IBR)approach indicated that the exposure to Mn/Fe had a negative impact on deep-sea mussels,and Mn demonstrated a more harmful impact on deep-sea mussels than Fe.Additionally,SOD and CAT biomarkers had the greatest impact on IBR values in Mn treatments,while ACP and HK were most influential for the low-and high-dose Fe groups,respectively.This study represents the first application of the IBR approach to evaluate the toxicity of metals on deep-sea fauna and serves as a crucial framework for risk assessment of deep-sea mining-associated metal exposure. 展开更多
关键词 MUSSEL metal deep-sea mining BIOMARKER environmental monitoring
下载PDF
Dust-Holding Capacity and Bio-Chemical Changes of Plant Species Growing in an Around Opencast Mining Area of Bundelkhand Region of Uttar Pradesh, India
11
作者 Priyanka Singh Amit Pal 《American Journal of Plant Sciences》 CAS 2024年第8期677-698,共22页
The present study has been carried out on a total of 50 available plant species to assess their dust-capturing capacity and biochemical performances in and around open cast granite mine areas of Jhansi district and Bu... The present study has been carried out on a total of 50 available plant species to assess their dust-capturing capacity and biochemical performances in and around open cast granite mine areas of Jhansi district and Bundelkhand University campus treated as control site. Plant species existing under a polluted environment for a long time may be considered as potentially resistant species and recommended for green belt design in mining areas, especially to cope with dust pollution. Results showed the pollution level, especially of mining-originated dust particles holding capacity of leaves and effects of different biochemical parameters (Total Chlorophyll, Protein and Carotenoid) of existing plant species both from mining areas as well as from Bundelkhand University campus. Based on their performances, Tectona grandis L., Ficus hispida L., Calotropis procera Aiton., Butea monosperma Lam. and Ficus benghalensis L., etc. are highly tolerant species while Ficus infectoria L., Artocarpus heterophyllus Lam., Ipomoea purpurea L., Allianthus excelsa Roxb. and Bauhinia variegata L. are intermediate tolerant species. T. grandis had shown the highest dust-holding capacity (2.566 ± 0.0004 mg/cm2) whereas Albizia procera (0.018 ± 0.0002 mg/cm2) was found to be the lowest dust-holding capacity. Our findings also showed that the T. grandis and F. hispida have significant dust deposition with minimal effect of dust on their leaf chlorophyll (17.447 ± 0.019 mg/g and 14.703 ± 0.201 mg/g), protein (0.699 ± 0.001 mg/g and 0.604 ± 0.002 mg/g) and carotenoid (0.372 ± 0.003 mg/g and 0.354 ± 0.003 mg/g) content respectively among all selected plant species. Therefore, in the present investigation, plant species with high tolerance to high dust-holding capacity on their leaf surfaces are preferable for green corridors as open cast granite mines and their adjacent areas. 展开更多
关键词 Bundelkhand Region Biochemical Changes Dust-Holding Capacity Chlorophyll Content Open Cast Granite mining
下载PDF
Game theory attack pricing for mining pools in blockchain-based IoT
12
作者 Yourong Chen Hao Chen +3 位作者 Zhenyu Xiong Banteng Liu Zhangquan Wang Meng Han 《Digital Communications and Networks》 SCIE CSCD 2024年第4期973-988,共16页
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize t... The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network.The employed computing power carries out the pool mining attacks on the attacked mining pool.To realize the win-win game between the malicious mining pool and the employee,the paper proposes an Employment Attack Pricing Algorithm(EAPA)of mining pools in blockchain based on game theory.In the EAPA,the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack,the revenue increment of malicious mining pools,and the revenue of the employee.It establishes a game model between the malicious mining pool and the employee under the employment attack.Then,the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation.In the strategy,the malicious mining pool analyzes the conditions for the employment attack,and uses the derivative method to find the optimal utilization value of computing power,employees analyze the conditions for accepting employment,and use the derivative method to find the optimal reward value of computing power.Finally,the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation.The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee.The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time.The EAPA outperforms the state-of-the-art methods such as SPSUCP,DPSACP,and FPSUCP. 展开更多
关键词 Game theory Blockchain PoW mining pool Employment attack
下载PDF
Experimental Investigation on Vertical Hydraulic Transport of Ores in Deepsea Mining
13
作者 LIU Lei LIU Jian-cheng +2 位作者 LI Xin XU Li-xin ZHANG Xiu-zhan 《China Ocean Engineering》 SCIE EI CSCD 2024年第1期42-53,共12页
Deepsea mining has been proposed since the 1960s to alleviate the lack of resources on land.Vertical hydraulic transport of collected ores from the seabed to the sea surface is considered the most promising method for... Deepsea mining has been proposed since the 1960s to alleviate the lack of resources on land.Vertical hydraulic transport of collected ores from the seabed to the sea surface is considered the most promising method for industrial applications.In the present study,an indoor model test of the vertical hydraulic transport of particles was conducted.A noncontact optical method has been proposed to measure the local characteristics of the particles inside a vertical pipe,including the local concentration and particle velocity.The hydraulic gradient of ore transport was evaluated with various particle size distributions,particle densities,feeding concentrations and mixture flow velocities.During transport,the local concentration is larger than the feeding concentration,whereas the particle velocity is less than the mixture velocity.The qualitative effects of the local concentration and local fluid velocity on the particle velocity and slip velocity were investigated.The local fluid velocity contributes significantly to particle velocity and slip velocity,whereas the effect of the local concentration is marginal.A higher feeding concentration and mixture flow velocity result in an increased hydraulic gradient.The effect of the particle size gradation is slight,whereas the particle density plays a crucial role in the transport. 展开更多
关键词 deepsea mining vertical hydraulic transport experiment flow characteristics
下载PDF
Spatial distribution and potential ecological and health risks associated with heavy metals in the Ijero-Ekiti mining site,Nigeria
14
作者 Johnson Adedeji OLUSOLA Adeyinka Oluyemi ATURAMU +1 位作者 Olufunke ASAOLU Olusesan Sola OGUNLEYE 《Regional Sustainability》 2024年第1期26-41,共16页
Artisanal gold mining,a labor-intensive and antiquated technique,is a growing industry and the source of income for rural communities all over the world.However,artisanal gold mining has potential negative and long-te... Artisanal gold mining,a labor-intensive and antiquated technique,is a growing industry and the source of income for rural communities all over the world.However,artisanal gold mining has potential negative and long-term effects on economy,environment,and society.This study collected soil samples from 16 sample points including a control point to examine the pollution degrees and spatial distribution of heavy metals,as well as ecological and health risks associated with heavy metal pollution in the Ijero-Ekiti mining site,Nigeria.Geographical Information System(GIS)and remote sensing technologies were used to identify regions with high concentrations of heavy metals and assess the environmental impact of gold mining activities.The results show that the mean heavy metal concentrations of 16 soil pointa are 8.94(±5.97)mg/kg for As,0.18(±0.54)mg/kg for Cd,0.11(±1.06)mg/kg for Co,14.32(±3.43)mg/kg for Cr,6.89(±0.64)mg/kg for Cu,48.92(±11.77)mg/kg for Fe,135.81(±30.75)mg/kg for Mn,5.92(±0.96)mg/kg for Ni,5.72(±1.66)mg/kg for Pb,and 13.94(±1.38)mg/kg for Zn.The study reveals that heavy metal concentration in soils follows the order of Mn>Fe>Cr>Zn>As>Cu>Ni>Pb>Co>Cd.An analysis of soil samples indicates that 3 principal components(PCs)account for 70.008%of the total variance and there are strong positive correlations between various pairs of heavy metals.The total potential ecological risk index(309.599)in the study area is high.Non-carcinogenic risk suggests that there may be long-term health impacts on people who work in the mining areas due to chronic exposure to the environment.Based on the study,the hazard index of carcinogenic health risks associated with heavy metals through ingestion is 520.00×10^(–4).Dermal contact from As and Cr also increases the risk of cancer,with the highest hazard index value of 18.40×10^(–4).The lowest exposure pathway,with the hazard index value of 0.68×10^(–4),indicates that the inhalation of heavy metals has a comparatively low risk of cancer.This study recommends the formulation of policies to monitor the Ijero-Ekiti mining site and other regions in Nigeria where indiscriminate artisanal gold mining activities exist. 展开更多
关键词 Artisanal gold mining Heavy metals Exposure pathway Potential ecological risk Geo-accumulation index Ijero-Ekiti mining site
下载PDF
Coordinated Mining Procedures of Open Pit Mines Based on River Management
15
作者 Baoyu CAO Zhiyong ZHANG +2 位作者 Bo WANG Ruirong DONG Hongjian WANG 《Asian Agricultural Research》 2024年第5期11-14,19,共5页
This paper primarily concerns the effective coordination of the procedures and methods employed in open pit mining operations under the background of river management.The central objective of this study is to identify... This paper primarily concerns the effective coordination of the procedures and methods employed in open pit mining operations under the background of river management.The central objective of this study is to identify a viable approach for ensuring rational and efficient development of open pit mineral resources while simultaneously protecting and restoring the ecological environment of the river.This approach should facilitate the realization of a harmonious symbiosis between mining and river management.The intricate mutual influence relationship between river management and open pit mining is first analyzed in depth,which provides a solid foundation for the subsequent coordination strategy development.In light of the aforementioned considerations,a set of coordination procedures for open pit mining based on river management conditions is proposed.These procedures emphasize the integration of river protection into the overall layout of mining at the planning stage.The implementation of scientific mining schemes,accompanied by rigorous control of the scope and depth of mining operations,has proven to be an effective means of reducing the impact of mining activities on river environments.This approach has also facilitated the achievement of a balance and coordination between mining and river management. 展开更多
关键词 River management Open pit mine mining procedure Coordinated mining
下载PDF
Software Vulnerability Mining and Analysis Based on Deep Learning
16
作者 Shibin Zhao Junhu Zhu Jianshan Peng 《Computers, Materials & Continua》 SCIE EI 2024年第8期3263-3287,共25页
In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current secu... In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method. 展开更多
关键词 Vulnerability mining software security deep learning static analysis
下载PDF
Experimental investigation of dynamic characteristics of leaching tubing for solution mining of salt cavern carbon and energy storage
17
作者 Yin-Ping Li Xin-Bo Ge +1 位作者 Xi-Lin Shi Hong-Ling Ma 《Petroleum Science》 SCIE EI CAS CSCD 2024年第4期2703-2722,共20页
Salt caverns are extensively utilized for storing various substances such as fossil energy,hydrogen,compressed air,nuclear waste,and industrial solid waste.In China,when the salt cavern is leached through single-well ... Salt caverns are extensively utilized for storing various substances such as fossil energy,hydrogen,compressed air,nuclear waste,and industrial solid waste.In China,when the salt cavern is leached through single-well water solution mining with oil as a cushion,engineering challenges arise with the leaching tubing,leading to issues like damage and instability.These problems significantly hinder the progress of cavern construction and the control of cavern shape.The primary cause of this is the flowinduced vibration instability of leaching tubing within a confined space,which results in severe bending or damage to the tubing.This study presents a model experimental investigation on the dynamic characteristics of leaching tubing using a self-developed liquid-solid coupling physical model experiment apparatus.The experiment utilizes a silicone-rubber pipe(SRP)and a polycarbonate pipe(PCP)to examine the effects of various factors on the dynamic stability of cantilevered pipes conveying fluid.These factors include external space constraint,flexural rigidity,medium outside the pipe,overhanging length,and end conditions.The experiments reveal four dynamic response phenomena:water hammer,static buckling,chaotic motion,and flutter instability.The study further demonstrates that the length of the external space constraint has a direct impact on the flutter critical flow velocity of the cantilevered pipe conveying fluid.Additionally,the flutter critical flow velocity is influenced by the end conditions and different external media. 展开更多
关键词 Salt cavern storage Solution mining Leaching tubing Experimental investigation Flutter instability
下载PDF
A semi-infinite beam theoretical model on predicting rock slope subsidence induced by underground mining
18
作者 LIU Xinrong WANG Nanyun +2 位作者 ZHONG Zuliang DU Libing LIANG Erwei 《Journal of Mountain Science》 SCIE CSCD 2024年第2期633-647,共15页
When the mining goaf is close to the cliff,rock slope subsidence induced by underground mining is significantly affected by its boundary conditions.In this study,an analytical method is proposed by considering the key... When the mining goaf is close to the cliff,rock slope subsidence induced by underground mining is significantly affected by its boundary conditions.In this study,an analytical method is proposed by considering the key strata as a semi-infinite Euler-Bernoulli beam rested on a Winkler foundation with a local subsidence area.The analytical solutions of deflection are derived by analyzing the boundary and continuity conditions of the cliff.Then,the analytical solutions are verified by the results from experimental tests,FEM and InSAR,respectively.After that,the influence of changing parameters on deflections is studied with sensitivity analysis.The results show that the distance between goaf and cliff significantly affects the deflection of semi-infinite beam.The response of semi-infinite beam is obviously determined by the length of goaf and the bending stiffness of beam.The comparisons between semi-infinite beam and infinite beam illustrate the ascendancy of the improved model in such problems. 展开更多
关键词 Key strata mining rock slope Winkler foundation Euler-Bernoulli beam Subsidence prediction
下载PDF
Mobility of Major and Trace Elements during the Bauxitization Processes in Ngaoundal Area (Adamawa Cameroon): Implication on Mining Perspectives
19
作者 André Sini Harouna Boukari +4 位作者 Ondoa Augustin Désiré Balla Djetenbe Beral Salomon Wangmené Awé Simon Djakba Basga Jean Pierre Nguetnkam 《Open Journal of Geology》 CAS 2024年第1期81-100,共20页
This study was focused to assess major and trace elements in bauxitic duricrusts from Ngaoundal and its surroundings in order to establish their mining interest. To this end, fieldworks, mineralogical and geochemical ... This study was focused to assess major and trace elements in bauxitic duricrusts from Ngaoundal and its surroundings in order to establish their mining interest. To this end, fieldworks, mineralogical and geochemical analyses were carried out. Four facies of duricrust were identified and characterized from the summit to the top of the slope of the Ngaoundal mountain: scoriaceous, pisolitic, nodular and massive. Mineralogical and geochemical analyses performed on 16 samples, revealed a significant concentration of Al<sub>2</sub>O<sub>3</sub> mainly in the scoriaceous facies (over 45% in grade), moderate in Fe<sub>2</sub>O<sub>3</sub> (averaging 23.69%) and SiO<sub>2</sub> (averaging 21.7%). Trace elements were generally low, excluding Cr (421 ppm on average), Zr (327 ppm on average and V (213 ppm on average). In addition, the limited quantities of alkalis (Na<sub>2</sub>O, K<sub>2</sub>O) and alkaline earths metals (MgO, CaO) coupled with the very high values of Chemical Index of Alteration (CIA) and Mineralogical Index of Alteration (MIA), (more than 99%) attest to the intense weathering of the studied materials. Allitization and monosiallitization constituted the crystallochemical phenomena that have led to the development of bauxitic minerals. More than 90% of gibbsite in scoriaceous facies, 52.21% - 76.01% of kaolinite in pisolitic facies and more than 40% of hematite in nodular facies were quantified. The relationships between the constitutive components indicated their interdependency during the bauxitization phenomenon. The mineralogical and geochemical properties highlighted the mining interest of the studied duricrusts to be valorized. 展开更多
关键词 Duricrust Bauxitization Phenomenon Mineralogical and Geochemical Characterization Major and Trace Elements mining Potential
下载PDF
Binary Program Vulnerability Mining Based on Neural Network
20
作者 Zhenhui Li Shuangping Xing +5 位作者 Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1861-1879,共19页
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i... Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion. 展开更多
关键词 Vulnerability mining de-obfuscation neural network graph embedding network symbolic execution
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部