Sudden earthquakes pose a threat to the running safety of trains on high-speed railway bridges,and the stiffness of piers is one of the factors affecting the dynamic response of train-track-bridge system.In this paper...Sudden earthquakes pose a threat to the running safety of trains on high-speed railway bridges,and the stiffness of piers is one of the factors affecting the dynamic response of train-track-bridge system.In this paper,a experiment of a train running on a high-speed railway bridge is performed based on a dynamic experiment system,and the corresponding numerical model is established.The reliability of the numerical model is verified by experiments.Then,the experiment and numerical data are analyzed to reveal the pier height effects on the running safety of trains on bridges.The results show that when the pier height changes,the frequency of the bridge below the 30 m pier height changes greater;the increase of pier height causes the transverse fundamental frequency of the bridge close to that of the train,and the shaking angle and lateral displacement of the train are the largest for bridge with 50 m pier,which increases the risk of derailment;with the pier height increases from 8 m to 50 m,the derailment coefficient obtained by numerical simulations increases by 75% on average,and the spectral intensity obtained by experiments increases by 120% on average,two indicators exhibit logarithmic variation.展开更多
Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual int...Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed.展开更多
A method of cable safety analysis is proposed for safety evaluation of long-span cable-stayed bridges. The Daniels' effect and the probability of broken wires in the cable are introduced to develop the cable strength...A method of cable safety analysis is proposed for safety evaluation of long-span cable-stayed bridges. The Daniels' effect and the probability of broken wires in the cable are introduced to develop the cable strength model and the reliability assessment technique for long-span cable-stayed bridges based on the safety factors analysis of stay cables in service. As an application of the proposed model, the cable safety reliability of the cable No. 25 of Zhaobaoshan cable-stayed bridge in China is calculated. The effects of various parameters on the estimated cable safety reliability are investigated. The results indicate that the proposed method can be used to assess the safety level of stay cables in cable-stayed bridges effectively. The Daniels' effect should be taken into account for assessment, and the probability of broken wires can be used to simulate the deterioration of stay cables in service.展开更多
Xinli district of Sanshandao Gold Mine is the first subsea metal mine in China.To achieve 6 kt/d production capacity under the premise of safe mining,high-intensity mining might destroy the in-situ stress filed and th...Xinli district of Sanshandao Gold Mine is the first subsea metal mine in China.To achieve 6 kt/d production capacity under the premise of safe mining,high-intensity mining might destroy the in-situ stress filed and the stability of rockmass.According to sampling and testing of ore-rock and backfill and in-situ stress field measurement,safety factor method calculation model based on stress-strain strength reduction at arbitrary points and Mohr-Coulomb yield criterion was established and limit displacement subsidence values under the safety factor of different limit stoping steps were calculated.The results from three years in-situ mining and strata movement monitoring using multi-point displacements meter showed that the lower settlement frame stope hierarchical level filling mining method,mining sequence are reasonable and rockmass stability evaluation using safety factor method,in-situ real-time monitoring can provide the technical foundation for the safety of seabed mining.展开更多
In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mat...In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mathematical problems. Combining the E1Gamal scheme based on the discrete logarithm problem and the OSS scheme based on the factoring problem, a digital signature scheme based on these two cryptographic assumptions is proposed. The security of the proposed scheme is based on the difficulties of simultaneously solving the factoring problem and the discrete logarithm problem. So the signature scheme will be still secure under the situation that any one of the two hard-problems is solved. Compared with previous schemes, the proposed scheme is more efficient in terms of space storage, signature length and computation complexities.展开更多
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data...The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable.展开更多
The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interfa...The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interface (SDSXS-API) to ensure the reliability, the integrity, and the security in the data transmission and exchange. The design and the implementation of SDSXS-API are also given. The proposed APIs can be conveniently used as a uniform exchange interface for any related application programs. And their effectiveness is verified in the prototype mobile database system.展开更多
In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackl...In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackled by the NB component), unobserved heterogeneity and spatial autocorrelation (captured by the CAR process), using Markov chain Monte Carlo methods and the Gibbs sampler. Statistical tests suggest that the CAR-NB model is preferred over the CAR-Poisson, NB, zero-inflated Poisson, zero-inflated NB models, due to its lower prediction errors and more robust parameter inference. The study results show that crash frequency and fatalities are positively associated with the number of lanes, curve length, annual average daily traffic (AADT) per lane, as well as rainfall. Speed limit and the distances to the nearest hospitals have negative associations with segment-based crash counts but positive associations with fatality counts, presumably as a result of worsened collision impacts at higher speed and time loss during transporting crash victims.展开更多
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be...A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.展开更多
In 2011, Yunnan provincial committee and government proposed the strat- egy of constructing mountainous cities in order to protect farmlands and guarantee crop safety, which makes full use of hills and gentle-slopes a...In 2011, Yunnan provincial committee and government proposed the strat- egy of constructing mountainous cities in order to protect farmlands and guarantee crop safety, which makes full use of hills and gentle-slopes and transforms land use pattern. However, social and economic development performs unevenly in Yun- nan, supplemented by varied geographical conditions, so that constructing mountain- ous cities should proceed as per local conditions. The research proposed the con- trol of constructing mountainous cities provided crop safety under the principle of farmland protection and measured the quantities of demanded construction lands ac- cording to science of population prediction and ekistics, based on which the control scales of constructing mountainous cities were determined by multiplying basic farm- land coefficient and the area of newly increased construction lands. The research is of significance for guiding the construction of mountainous cities and avoiding the occupation of construction lands on farmlands.展开更多
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl...Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.展开更多
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ...The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.展开更多
In order to determine the slip plane of slope directly by the calculation results of strength reduction method, and analyze the influential factors of slope stability, a numerical model was established in plane strain...In order to determine the slip plane of slope directly by the calculation results of strength reduction method, and analyze the influential factors of slope stability, a numerical model was established in plane strain mode by FLAC3D for homogeneous soil slope, whose parameters were reduced until the slope reached the critical state. Then FISH program was used to get the location data of slip plane from displacement contour lines. Furthermore, the method to determine multiple slip planes was also proposed by setting different heights of elastic areas. The influential factors for the stability were analyzed, including cohesion, internal friction angle, and tensile strength. The calculation results show that with the increase of cohesion, failure mode of slope changes from shallow slipping to the deep slipping, while inclination of slip plane becomes slower and slipping volume becomes larger; with the increase of friction angle, failure mode of slope changes from deep slipping to shallow slipping, while slip plane becomes steeper and upper border of slip plane comes closer to the vertex of slope; the safety factor increases little and slip plane goes far away from vertex of slope with the increase of tensile strength.展开更多
The safety factor of roof under deep high stress is a quantitative index for evaluating roof stability.Based on the failure mode of surrounding rock of stope roof,the mechanics model of goaf roof is constructed,and th...The safety factor of roof under deep high stress is a quantitative index for evaluating roof stability.Based on the failure mode of surrounding rock of stope roof,the mechanics model of goaf roof is constructed,and the internal force of roof is deduced by the theory of hingeless arch.The calculation method of roof safety factor(K)under the environment of deep mining is proposed in view of compression failure and shear failure of roof.The calculation formulas of shear safety factor(K1),compression safety factor(K2)and comprehensive safety factor(K)of roof are given.The influence of stope span and roof thickness on roof stability is considered in this paper.The results show that when the roof thickness remains constant,the roof safety factor decreases with the increasing of the stope span;when the stope span remains constant,the roof safety factor increases with the increasing of the roof thickness.The deep mining example shows that when the stope span is 30 m and the roof thickness is 10 m,the roof comprehensive safety factor is 1.12,which indicates the roof is in a stable state.展开更多
基金Projects(52022113,52278546)supported by the National Natural Science Foundation of ChinaProject(2020EEEVL0403)supported by the China Earthquake Administration。
文摘Sudden earthquakes pose a threat to the running safety of trains on high-speed railway bridges,and the stiffness of piers is one of the factors affecting the dynamic response of train-track-bridge system.In this paper,a experiment of a train running on a high-speed railway bridge is performed based on a dynamic experiment system,and the corresponding numerical model is established.The reliability of the numerical model is verified by experiments.Then,the experiment and numerical data are analyzed to reveal the pier height effects on the running safety of trains on bridges.The results show that when the pier height changes,the frequency of the bridge below the 30 m pier height changes greater;the increase of pier height causes the transverse fundamental frequency of the bridge close to that of the train,and the shaking angle and lateral displacement of the train are the largest for bridge with 50 m pier,which increases the risk of derailment;with the pier height increases from 8 m to 50 m,the derailment coefficient obtained by numerical simulations increases by 75% on average,and the spectral intensity obtained by experiments increases by 120% on average,two indicators exhibit logarithmic variation.
文摘Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed.
基金The Opening Fund of the Key Laboratory of UrbanSecurity and Disaster Engineering of Ministry of Education (NoEESR200701)the Opening Fund of Beijing Laboratory of EarthquakeEngineering and Structural Retrofit
文摘A method of cable safety analysis is proposed for safety evaluation of long-span cable-stayed bridges. The Daniels' effect and the probability of broken wires in the cable are introduced to develop the cable strength model and the reliability assessment technique for long-span cable-stayed bridges based on the safety factors analysis of stay cables in service. As an application of the proposed model, the cable safety reliability of the cable No. 25 of Zhaobaoshan cable-stayed bridge in China is calculated. The effects of various parameters on the estimated cable safety reliability are investigated. The results indicate that the proposed method can be used to assess the safety level of stay cables in cable-stayed bridges effectively. The Daniels' effect should be taken into account for assessment, and the probability of broken wires can be used to simulate the deterioration of stay cables in service.
基金Project(10872218) supported by the National Natural Science Foundation of ChinaProject(2010CB732004) supported by the National Key Basic Research Program of China+1 种基金Project(20090461022) supported by the National Postdoctoral Foundation of ChinaProject (11MX21) supported by the Students' Innovation Project Aubsidize Award of Arcelor Mittal
文摘Xinli district of Sanshandao Gold Mine is the first subsea metal mine in China.To achieve 6 kt/d production capacity under the premise of safe mining,high-intensity mining might destroy the in-situ stress filed and the stability of rockmass.According to sampling and testing of ore-rock and backfill and in-situ stress field measurement,safety factor method calculation model based on stress-strain strength reduction at arbitrary points and Mohr-Coulomb yield criterion was established and limit displacement subsidence values under the safety factor of different limit stoping steps were calculated.The results from three years in-situ mining and strata movement monitoring using multi-point displacements meter showed that the lower settlement frame stope hierarchical level filling mining method,mining sequence are reasonable and rockmass stability evaluation using safety factor method,in-situ real-time monitoring can provide the technical foundation for the safety of seabed mining.
基金The National Natural Science Foundation of China(No60402019)the Science Research Program of Education Bureau of Hubei Province (NoQ200629001)
文摘In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mathematical problems. Combining the E1Gamal scheme based on the discrete logarithm problem and the OSS scheme based on the factoring problem, a digital signature scheme based on these two cryptographic assumptions is proposed. The security of the proposed scheme is based on the difficulties of simultaneously solving the factoring problem and the discrete logarithm problem. So the signature scheme will be still secure under the situation that any one of the two hard-problems is solved. Compared with previous schemes, the proposed scheme is more efficient in terms of space storage, signature length and computation complexities.
文摘The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable.
文摘The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interface (SDSXS-API) to ensure the reliability, the integrity, and the security in the data transmission and exchange. The design and the implementation of SDSXS-API are also given. The proposed APIs can be conveniently used as a uniform exchange interface for any related application programs. And their effectiveness is verified in the prototype mobile database system.
基金The National Science Foundation by Changjiang Scholarship of Ministry of Education of China(No.BCS-0527508)the Joint Research Fund for Overseas Natural Science of China(No.51250110075)+1 种基金the Natural Science Foundation of Jiangsu Province(No.SBK200910046)the Postdoctoral Science Foundation of Jiangsu Province(No.0901005C)
文摘In order to improve crash occurrence models to account for the influence of various contributing factors, a conditional autoregressive negative binomial (CAR-NB) model is employed to allow for overdispersion (tackled by the NB component), unobserved heterogeneity and spatial autocorrelation (captured by the CAR process), using Markov chain Monte Carlo methods and the Gibbs sampler. Statistical tests suggest that the CAR-NB model is preferred over the CAR-Poisson, NB, zero-inflated Poisson, zero-inflated NB models, due to its lower prediction errors and more robust parameter inference. The study results show that crash frequency and fatalities are positively associated with the number of lanes, curve length, annual average daily traffic (AADT) per lane, as well as rainfall. Speed limit and the distances to the nearest hospitals have negative associations with segment-based crash counts but positive associations with fatality counts, presumably as a result of worsened collision impacts at higher speed and time loss during transporting crash victims.
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
文摘A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.
基金Supported by National Natural Science Foundation of China(41261018)Scientific Research Foundation of Yunnan Education Committee(2015YUFEYC011)~~
文摘In 2011, Yunnan provincial committee and government proposed the strat- egy of constructing mountainous cities in order to protect farmlands and guarantee crop safety, which makes full use of hills and gentle-slopes and transforms land use pattern. However, social and economic development performs unevenly in Yun- nan, supplemented by varied geographical conditions, so that constructing mountain- ous cities should proceed as per local conditions. The research proposed the con- trol of constructing mountainous cities provided crop safety under the principle of farmland protection and measured the quantities of demanded construction lands ac- cording to science of population prediction and ekistics, based on which the control scales of constructing mountainous cities were determined by multiplying basic farm- land coefficient and the area of newly increased construction lands. The research is of significance for guiding the construction of mountainous cities and avoiding the occupation of construction lands on farmlands.
文摘Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.
文摘The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.
基金Project(20060533071) supported by the Doctoral Program Foundation of Higher Education of ChinaProject (20060400264) supported by China Postdoctoral Science Foundation+1 种基金Project (50774093) supported by the National Natural Science Foundation of ChinaProject (1343-74236000014) supported by Graduate Student Innovation Foundation of Hunan Province, China
文摘In order to determine the slip plane of slope directly by the calculation results of strength reduction method, and analyze the influential factors of slope stability, a numerical model was established in plane strain mode by FLAC3D for homogeneous soil slope, whose parameters were reduced until the slope reached the critical state. Then FISH program was used to get the location data of slip plane from displacement contour lines. Furthermore, the method to determine multiple slip planes was also proposed by setting different heights of elastic areas. The influential factors for the stability were analyzed, including cohesion, internal friction angle, and tensile strength. The calculation results show that with the increase of cohesion, failure mode of slope changes from shallow slipping to the deep slipping, while inclination of slip plane becomes slower and slipping volume becomes larger; with the increase of friction angle, failure mode of slope changes from deep slipping to shallow slipping, while slip plane becomes steeper and upper border of slip plane comes closer to the vertex of slope; the safety factor increases little and slip plane goes far away from vertex of slope with the increase of tensile strength.
基金Projects(51974135,51704094)supported by the National Natural Science Foundation of ChinaProject(2016YFC0600802)supported by the National Key Research and Development Program of ChinaProject(2020M672226)supported by the China Postdoctoral Science Foundation。
文摘The safety factor of roof under deep high stress is a quantitative index for evaluating roof stability.Based on the failure mode of surrounding rock of stope roof,the mechanics model of goaf roof is constructed,and the internal force of roof is deduced by the theory of hingeless arch.The calculation method of roof safety factor(K)under the environment of deep mining is proposed in view of compression failure and shear failure of roof.The calculation formulas of shear safety factor(K1),compression safety factor(K2)and comprehensive safety factor(K)of roof are given.The influence of stope span and roof thickness on roof stability is considered in this paper.The results show that when the roof thickness remains constant,the roof safety factor decreases with the increasing of the stope span;when the stope span remains constant,the roof safety factor increases with the increasing of the roof thickness.The deep mining example shows that when the stope span is 30 m and the roof thickness is 10 m,the roof comprehensive safety factor is 1.12,which indicates the roof is in a stable state.