In the process of using the original key stratum theory to predict the height of a water-flowing fractured zone(WFZ),the influence of rock strata outside the calculation range on the rock strata within the calculation...In the process of using the original key stratum theory to predict the height of a water-flowing fractured zone(WFZ),the influence of rock strata outside the calculation range on the rock strata within the calculation range as well as the fact that the shape of the overburden deformation area will change with the excavation length are ignored.In this paper,an improved key stratum theory(IKS theory)was proposed by fixing these two shortcomings.Then,a WFZ height prediction method based on IKS theory was established and applied.First,the range of overburden involved in the analysis was determined according to the tensile stress distribution range above the goaf.Second,the key stratum in the overburden involved in the analysis was identified through IKS theory.Finally,the tendency of the WFZ to develop upward was determined by judging whether or not the identified key stratum will break.The proposed method was applied and verified in a mining case study,and the reasons for the differences in the development patterns between the WFZs in coalfields in Northwest and East China were also fully explained by this method.展开更多
There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on t...There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on the research of the basic theories of new-generation Internet system, is proposed. The solution creates a switching routing model and theory for the new-generation Internet system, and defines the access identifier, generalized switching routing identifier and their mapping principles. It also establishes a pervasive service system architecture and theory, defines the service identifier, connection identifier and their mapping principles. This paper discusses key technologies for the new-generation Internet system, such as access control and management, trusted routing and Quality of Service (QoS), multi-streaming, and network monitoring and management.展开更多
During the underground mining of coal resources,overlying rocks on the roof of excavated tunnels will be destroyed due to ground pressure,and as a result,part of them will break and fall into the tunnels.How to determ...During the underground mining of coal resources,overlying rocks on the roof of excavated tunnels will be destroyed due to ground pressure,and as a result,part of them will break and fall into the tunnels.How to determine the distribution of fractured areas and fissures presents a major problem for preserving the overlying aquifer.展开更多
In this short review paper, the significant and profound impacts of the distorted key theory for developing peptide drugs have been briefly recalled with crystal clear convincingness.
The nonthermal components in hard X-rays have been detected in two young supernova remnants (SNRs): SN 1006 and Kepler's SNR. Various theoretical models showed that the amplification of the magnetic field was cruc...The nonthermal components in hard X-rays have been detected in two young supernova remnants (SNRs): SN 1006 and Kepler's SNR. Various theoretical models showed that the amplification of the magnetic field was crucial to explain their multiband emission properties. We investigate the evolution of the magnetic field and model the multiband emissions from these two young SNRs with a time-dependent injection model. The results indicate that (1) the radio and X-ray emissions are re- produced by synchrotron radiation of the injected electrons, while the y-rays can be explained as inverse Compton scattering of the relativistic electrons and proton-proton interaction of the high-energy protons; and (2) the amplification of the magnetic field spontaneously happens with reasonable parameters.展开更多
Coalbed methane is of great value to extract and utilize in China, but the result of such research is not satisfied yet today.The paper analyzed the storage characteristics of coalbed methane, and then studied the beh...Coalbed methane is of great value to extract and utilize in China, but the result of such research is not satisfied yet today.The paper analyzed the storage characteristics of coalbed methane, and then studied the behavior of coalbed methane using the key stratum theory of strata control.According to the features related to coalbed methane accumulations and delivery, the technique for safely simultaneous extraction of coal and coalbed methane is proposed, and benefit analysis is made too.展开更多
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ...Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.展开更多
基金supported by the Key Projects of Natural Science Foundation of China(No.41931284)the Scientific Research Start-Up Fund for High-Level Introduced Talents of Anhui University of Science and Technology(No.2022yjrc21).
文摘In the process of using the original key stratum theory to predict the height of a water-flowing fractured zone(WFZ),the influence of rock strata outside the calculation range on the rock strata within the calculation range as well as the fact that the shape of the overburden deformation area will change with the excavation length are ignored.In this paper,an improved key stratum theory(IKS theory)was proposed by fixing these two shortcomings.Then,a WFZ height prediction method based on IKS theory was established and applied.First,the range of overburden involved in the analysis was determined according to the tensile stress distribution range above the goaf.Second,the key stratum in the overburden involved in the analysis was identified through IKS theory.Finally,the tendency of the WFZ to develop upward was determined by judging whether or not the identified key stratum will break.The proposed method was applied and verified in a mining case study,and the reasons for the differences in the development patterns between the WFZs in coalfields in Northwest and East China were also fully explained by this method.
基金the National BasicResearch Program of China ("973" Program)under Grant 2007CB307101the CultivationFinances of Ministry of Education for HigherEducation Institutes’Major Programs in Scienceand Technology Innovation Engineering underGrant 706005the Discipline Innovation andTalent Introduction Plan for Higher EducationInstitutes of China under Grant B08002.
文摘There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on the research of the basic theories of new-generation Internet system, is proposed. The solution creates a switching routing model and theory for the new-generation Internet system, and defines the access identifier, generalized switching routing identifier and their mapping principles. It also establishes a pervasive service system architecture and theory, defines the service identifier, connection identifier and their mapping principles. This paper discusses key technologies for the new-generation Internet system, such as access control and management, trusted routing and Quality of Service (QoS), multi-streaming, and network monitoring and management.
基金supported by the State Key Program of National Natural Science of China(Grant No.41130637)
文摘During the underground mining of coal resources,overlying rocks on the roof of excavated tunnels will be destroyed due to ground pressure,and as a result,part of them will break and fall into the tunnels.How to determine the distribution of fractured areas and fissures presents a major problem for preserving the overlying aquifer.
文摘In this short review paper, the significant and profound impacts of the distorted key theory for developing peptide drugs have been briefly recalled with crystal clear convincingness.
基金supported by the National Natural Science Foundation of China(Grant No.11173020)the National Basic Research Program of China(973Program,2009CB824800)
文摘The nonthermal components in hard X-rays have been detected in two young supernova remnants (SNRs): SN 1006 and Kepler's SNR. Various theoretical models showed that the amplification of the magnetic field was crucial to explain their multiband emission properties. We investigate the evolution of the magnetic field and model the multiband emissions from these two young SNRs with a time-dependent injection model. The results indicate that (1) the radio and X-ray emissions are re- produced by synchrotron radiation of the injected electrons, while the y-rays can be explained as inverse Compton scattering of the relativistic electrons and proton-proton interaction of the high-energy protons; and (2) the amplification of the magnetic field spontaneously happens with reasonable parameters.
文摘Coalbed methane is of great value to extract and utilize in China, but the result of such research is not satisfied yet today.The paper analyzed the storage characteristics of coalbed methane, and then studied the behavior of coalbed methane using the key stratum theory of strata control.According to the features related to coalbed methane accumulations and delivery, the technique for safely simultaneous extraction of coal and coalbed methane is proposed, and benefit analysis is made too.
基金This work is supported by National Natural Science Foundation of China under contract 60902008.
文摘Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.