Pointed out some technical difficulties of gob-side entry retaining with roadside packing in longwall top-coal caving technology (LTCT), and analyzed the function mecha-nism of roadside filling body. Theory analysis s...Pointed out some technical difficulties of gob-side entry retaining with roadside packing in longwall top-coal caving technology (LTCT), and analyzed the function mecha-nism of roadside filling body. Theory analysis shows the mechanical properties of high water material fit for the feature of deformation of gob-side entry retaining in LTCT, and gob-side entry retaining in LTCT face is one of effective ways to increase the recovery ra-tio of mining district.展开更多
The mining method optimization in subsea deep gold mines was studied. First, an index system for subsea mining method selection was established based on technical feasibility, security status, economic benefit, and ma...The mining method optimization in subsea deep gold mines was studied. First, an index system for subsea mining method selection was established based on technical feasibility, security status, economic benefit, and management complexity. Next, an evaluation matrix containing crisp numbers and triangular fuzzy numbers(TFNs) was constructed to describe quantitative and qualitative information simultaneously. Then, a hybrid model combining fuzzy theory and the Tomada de Decis?o Interativa Multicritério(TODIM) method was proposed. Finally, the feasibility of the proposed approach was validated by an illustrative example of selecting the optimal mining method in the Sanshandao Gold Mine(China). The robustness of this approach was demonstrated through a sensitivity analysis. The results show that the proposed hybrid TODIM method is reliable and stable for choosing the optimal mining method in subsea deep gold mines and provides references for mining method optimization in other similar undersea mines.展开更多
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel...Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.展开更多
To solve the problem of surface subsidence caused by mining,the main method is to reasonably process coal mining space.'Mining caving zone high-pressure grouting pulverized coal ash hydromass controlling roof and ...To solve the problem of surface subsidence caused by mining,the main method is to reasonably process coal mining space.'Mining caving zone high-pressure grouting pulverized coal ash hydromass controlling roof and overlying strata movement' technology is one of processing methods.After grouting pulverized coal ash hydromass in mining caving zone,formed one kind of special material which is used to support roof and effec- tively control the subsidence of overlying strata.For the accurate calculation of roof mining subsidence at grouting state,based on the characteristics of such materials,established its constitutive equation based on certain assumptions,gave deformation calculation method when the compound rock supports overlying strata,lay foundation for the actual calculation of subsidence of overlying strata after grouting and the promotion of mining caving zone grouting technology.展开更多
Mining method selection is the first and the most critical problem in mine design and depends on some parameters such as geotechnical and geological features and economic and geographic factors. In this paper, the fac...Mining method selection is the first and the most critical problem in mine design and depends on some parameters such as geotechnical and geological features and economic and geographic factors. In this paper, the factors affecting mining method selection are determined. These factors include shape, thick- ness, depth, slope, RMR and RSS of the orebody, RMR and RSS of the hanging wall and footwall. Then, the priorities of these factors are calculated. In order to calculate the priorities of factors and select the best mining method for Qapiliq salt mine, Iran, based on these priorities, fuzzy analytical hierarchy process (AHP) technique is used. For this purpose, a questionnaire was prepared and was given to the associated experts. Finally, after a comparison carried out based on the effective factors, between the four mining methods including area mining, room and pillar, cut and fill and stope and pillar methods, the stope and nillar mining method was selected as the most suitable method to this mine.展开更多
文摘Pointed out some technical difficulties of gob-side entry retaining with roadside packing in longwall top-coal caving technology (LTCT), and analyzed the function mecha-nism of roadside filling body. Theory analysis shows the mechanical properties of high water material fit for the feature of deformation of gob-side entry retaining in LTCT, and gob-side entry retaining in LTCT face is one of effective ways to increase the recovery ra-tio of mining district.
基金Project(2018dcyj052) supported by Survey Research Funds of Central South University,ChinaProject(51774321) supported by the National Natural Science Foundation of ChinaProject(2018YFC0604606) supported by the National Key Research and Development Program of China
文摘The mining method optimization in subsea deep gold mines was studied. First, an index system for subsea mining method selection was established based on technical feasibility, security status, economic benefit, and management complexity. Next, an evaluation matrix containing crisp numbers and triangular fuzzy numbers(TFNs) was constructed to describe quantitative and qualitative information simultaneously. Then, a hybrid model combining fuzzy theory and the Tomada de Decis?o Interativa Multicritério(TODIM) method was proposed. Finally, the feasibility of the proposed approach was validated by an illustrative example of selecting the optimal mining method in the Sanshandao Gold Mine(China). The robustness of this approach was demonstrated through a sensitivity analysis. The results show that the proposed hybrid TODIM method is reliable and stable for choosing the optimal mining method in subsea deep gold mines and provides references for mining method optimization in other similar undersea mines.
基金partly supported by National Natural Science Foundation of China (NSFC grant numbers: 61202110 and 61502205)the project of Jiangsu provincial Six Talent Peaks (Grant numbers: XYDXXJS-016)
文摘Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.
文摘To solve the problem of surface subsidence caused by mining,the main method is to reasonably process coal mining space.'Mining caving zone high-pressure grouting pulverized coal ash hydromass controlling roof and overlying strata movement' technology is one of processing methods.After grouting pulverized coal ash hydromass in mining caving zone,formed one kind of special material which is used to support roof and effec- tively control the subsidence of overlying strata.For the accurate calculation of roof mining subsidence at grouting state,based on the characteristics of such materials,established its constitutive equation based on certain assumptions,gave deformation calculation method when the compound rock supports overlying strata,lay foundation for the actual calculation of subsidence of overlying strata after grouting and the promotion of mining caving zone grouting technology.
文摘Mining method selection is the first and the most critical problem in mine design and depends on some parameters such as geotechnical and geological features and economic and geographic factors. In this paper, the factors affecting mining method selection are determined. These factors include shape, thick- ness, depth, slope, RMR and RSS of the orebody, RMR and RSS of the hanging wall and footwall. Then, the priorities of these factors are calculated. In order to calculate the priorities of factors and select the best mining method for Qapiliq salt mine, Iran, based on these priorities, fuzzy analytical hierarchy process (AHP) technique is used. For this purpose, a questionnaire was prepared and was given to the associated experts. Finally, after a comparison carried out based on the effective factors, between the four mining methods including area mining, room and pillar, cut and fill and stope and pillar methods, the stope and nillar mining method was selected as the most suitable method to this mine.