期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A method for predicting the water-flowing fractured zone height based on an improved key stratum theory 被引量:1
1
作者 Jianghui He Wenping Li +3 位作者 Kaifang Fan Wei Qiao Qiqing Wang Liangning Li 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2023年第1期61-71,共11页
In the process of using the original key stratum theory to predict the height of a water-flowing fractured zone(WFZ),the influence of rock strata outside the calculation range on the rock strata within the calculation... In the process of using the original key stratum theory to predict the height of a water-flowing fractured zone(WFZ),the influence of rock strata outside the calculation range on the rock strata within the calculation range as well as the fact that the shape of the overburden deformation area will change with the excavation length are ignored.In this paper,an improved key stratum theory(IKS theory)was proposed by fixing these two shortcomings.Then,a WFZ height prediction method based on IKS theory was established and applied.First,the range of overburden involved in the analysis was determined according to the tensile stress distribution range above the goaf.Second,the key stratum in the overburden involved in the analysis was identified through IKS theory.Finally,the tendency of the WFZ to develop upward was determined by judging whether or not the identified key stratum will break.The proposed method was applied and verified in a mining case study,and the reasons for the differences in the development patterns between the WFZs in coalfields in Northwest and East China were also fully explained by this method. 展开更多
关键词 Coal mining Water-flowing fractured zone height Prediction method Improved key stratum theory
下载PDF
Theories and Key Technologies for New-generation Internet System
2
作者 Zhang Hongke, Dong Ping, Yang Dong (Next Generation Internet Research Center, School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China) 《ZTE Communications》 2008年第1期18-22,共5页
There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on t... There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on the research of the basic theories of new-generation Internet system, is proposed. The solution creates a switching routing model and theory for the new-generation Internet system, and defines the access identifier, generalized switching routing identifier and their mapping principles. It also establishes a pervasive service system architecture and theory, defines the service identifier, connection identifier and their mapping principles. This paper discusses key technologies for the new-generation Internet system, such as access control and management, trusted routing and Quality of Service (QoS), multi-streaming, and network monitoring and management. 展开更多
关键词 theories and key Technologies for New-generation Internet System ZTE
下载PDF
Using of Key Stratum Theory to Study the Structural Development of Roof Aquifer 被引量:2
3
作者 CHEN Li ZHANG Fawang +4 位作者 YAO Hongchao HAN Zhantao QIAN Long CHEN Liang JIANG Chengchao 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2015年第6期2091-2091,共1页
During the underground mining of coal resources,overlying rocks on the roof of excavated tunnels will be destroyed due to ground pressure,and as a result,part of them will break and fall into the tunnels.How to determ... During the underground mining of coal resources,overlying rocks on the roof of excavated tunnels will be destroyed due to ground pressure,and as a result,part of them will break and fall into the tunnels.How to determine the distribution of fractured areas and fissures presents a major problem for preserving the overlying aquifer. 展开更多
关键词 In Using of key Stratum Theory to Study the Structural Development of Roof Aquifer
下载PDF
The Significant and Profound Impacts of Chou’s Distorted Key Theory for Developing Peptide Drugs 被引量:1
4
作者 Kuo-Chen Chou 《Natural Science》 2020年第9期638-639,共2页
In this short review paper, the significant and profound impacts of the distorted key theory for developing peptide drugs have been briefly recalled with crystal clear convincingness.
关键词 AIDS Peptide Drugs Distorted key Theory MICROENVIRONMENT
下载PDF
Modeling multiband emissions from two young SNRs with a time-dependent magnetic field 被引量:2
5
作者 Yun-Yong Tang Zu-Cheng Dai Li Zhang 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2013年第5期537-546,共10页
The nonthermal components in hard X-rays have been detected in two young supernova remnants (SNRs): SN 1006 and Kepler's SNR. Various theoretical models showed that the amplification of the magnetic field was cruc... The nonthermal components in hard X-rays have been detected in two young supernova remnants (SNRs): SN 1006 and Kepler's SNR. Various theoretical models showed that the amplification of the magnetic field was crucial to explain their multiband emission properties. We investigate the evolution of the magnetic field and model the multiband emissions from these two young SNRs with a time-dependent injection model. The results indicate that (1) the radio and X-ray emissions are re- produced by synchrotron radiation of the injected electrons, while the y-rays can be explained as inverse Compton scattering of the relativistic electrons and proton-proton interaction of the high-energy protons; and (2) the amplification of the magnetic field spontaneously happens with reasonable parameters. 展开更多
关键词 key words: radiation mechanisms: non-thermal -- gamma-rays: theory -- (ISM:)supernova remnant
下载PDF
FEASIBILITY ANALYSIS OF SAFETY SIMULTANEOUS EXTRACTION OF COAL AND COALBED METHANE 被引量:2
6
作者 李树刚 《Journal of Coal Science & Engineering(China)》 2000年第1期52-56,共5页
Coalbed methane is of great value to extract and utilize in China, but the result of such research is not satisfied yet today.The paper analyzed the storage characteristics of coalbed methane, and then studied the beh... Coalbed methane is of great value to extract and utilize in China, but the result of such research is not satisfied yet today.The paper analyzed the storage characteristics of coalbed methane, and then studied the behavior of coalbed methane using the key stratum theory of strata control.According to the features related to coalbed methane accumulations and delivery, the technique for safely simultaneous extraction of coal and coalbed methane is proposed, and benefit analysis is made too. 展开更多
关键词 simultaneous extraction key stratum theory bed seperated fissure methane drainage BENEFIT
全文增补中
A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
7
作者 JIANG Rui 《China Communications》 SCIE CSCD 2010年第4期23-28,共6页
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ... Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively. 展开更多
关键词 Denial of Service Security Protocol Analysis Formal Theory Strand Space Model Internet key Exchange
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部