With ever-increasing depth of coal mine and the continuous improvement of mechanization, heat damage has become one of the major disasters in coal mine exploitation. Established the temperature prediction models suita...With ever-increasing depth of coal mine and the continuous improvement of mechanization, heat damage has become one of the major disasters in coal mine exploitation. Established the temperature prediction models suitable for different kinds of tunnels through analysis of the heat of shafts, roadways and working faces. The average annual air temperature prediction equation from the inlets of shafts to the working faces was derived. The formula was deduced using combine method of iteration and direct calculation. The method can improve the precision of air temperature prediction, so we could establish the whole pathway air temperature prediction model with high precision. Emphasizing on the effects of leakage air to air temperature of working face and using the ideology of the finite difference method and considering the differential equation of inlet and outlet at different stages, this method can significantly improve the accuracy of temperature prediction. Program development uses Visual Basic 6.0 Language, and the Origin software was used to fit the relevant data. The predicted results shows that the air temperature generally tends to rapidly increase in the air inlet, then changes slowly on working face, and finally increases sharply in air outlet in the condition of goaf air leakage. The condition is in general consistent with the air temperature change tendency of working face with U-type ventilation system. The software can provide reliable scientific basis for reasonable ventilation, cooling measures and management of coal mine thermal hazards.展开更多
U disk is the most conveuient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation...U disk is the most conveuient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.展开更多
System analysts often use software fault prediction models to identify fault-prone modules during the design phase of the software development life cycle. The models help predict faulty modules based on the software m...System analysts often use software fault prediction models to identify fault-prone modules during the design phase of the software development life cycle. The models help predict faulty modules based on the software metrics that are input to the models. In this study, we consider 20 types of metrics to develop a model using an extreme learning machine associated with various kernel methods. We evaluate the effectiveness of the mode using a proposed framework based on the cost and efficiency in the testing phases. The evaluation process is carried out by considering case studies for 30 object-oriented software systems. Experimental results demonstrate that the application of a fault prediction model is suitable for projects with the percentage of faulty classes below a certain threshold, which depends on the efficiency of fault identification(low: 47.28%; median: 39.24%; high: 25.72%). We consider nine feature selection techniques to remove the irrelevant metrics and to select the best set of source code metrics for fault prediction.展开更多
基金Supported by the National Natural Science Foundation of China (50674091) Fundamental Research Funds for the Central Universities (2010YZ01 ) The authors gratefully acknowledge the contributions of The National Natural Science Foundation and Fundamental Research Funds for the Central Universities for funding this study.
文摘With ever-increasing depth of coal mine and the continuous improvement of mechanization, heat damage has become one of the major disasters in coal mine exploitation. Established the temperature prediction models suitable for different kinds of tunnels through analysis of the heat of shafts, roadways and working faces. The average annual air temperature prediction equation from the inlets of shafts to the working faces was derived. The formula was deduced using combine method of iteration and direct calculation. The method can improve the precision of air temperature prediction, so we could establish the whole pathway air temperature prediction model with high precision. Emphasizing on the effects of leakage air to air temperature of working face and using the ideology of the finite difference method and considering the differential equation of inlet and outlet at different stages, this method can significantly improve the accuracy of temperature prediction. Program development uses Visual Basic 6.0 Language, and the Origin software was used to fit the relevant data. The predicted results shows that the air temperature generally tends to rapidly increase in the air inlet, then changes slowly on working face, and finally increases sharply in air outlet in the condition of goaf air leakage. The condition is in general consistent with the air temperature change tendency of working face with U-type ventilation system. The software can provide reliable scientific basis for reasonable ventilation, cooling measures and management of coal mine thermal hazards.
文摘U disk is the most conveuient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.
基金the FIST project,of DST, government of India for sponsoring the work on web engineering and cloud based computing
文摘System analysts often use software fault prediction models to identify fault-prone modules during the design phase of the software development life cycle. The models help predict faulty modules based on the software metrics that are input to the models. In this study, we consider 20 types of metrics to develop a model using an extreme learning machine associated with various kernel methods. We evaluate the effectiveness of the mode using a proposed framework based on the cost and efficiency in the testing phases. The evaluation process is carried out by considering case studies for 30 object-oriented software systems. Experimental results demonstrate that the application of a fault prediction model is suitable for projects with the percentage of faulty classes below a certain threshold, which depends on the efficiency of fault identification(low: 47.28%; median: 39.24%; high: 25.72%). We consider nine feature selection techniques to remove the irrelevant metrics and to select the best set of source code metrics for fault prediction.