期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Optimal mining sequence for coal faces under a bedding slope:insight from landslide prevention
1
作者 LI Qingmiao ZHAO Jianjun +3 位作者 LI Zhichao DENG Jie ZUO Jing LAI Qiyi 《Journal of Mountain Science》 SCIE CSCD 2024年第5期1775-1798,共24页
Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in p... Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in plains due to multi-seam coal mining and the instability of natural bedding slopes, yet the cumulative impact of different mining sequences on bedding slopes has been less explored. This study combines drone surveys and geological data to construct a comprehensive three-dimensional model of bedding slopes. Utilizing FLAC3D and PFC2D models, derived from laboratory experiments, it simulates stress, deformation, and failure dynamics of slopes under various mining sequences. Incorporating fractal dimension analysis, the research evaluates the stability of slopes in relation to different mining sequences. The findings reveal that mining in an upslope direction minimizes disruption to overlying strata. Initiating extraction from lower segments increases tensile-shear stress in coal pillar overburdens, resulting in greater creep deformation towards the downslope than when starting from upper segments, potentially leading to localized landslides and widespread creep deformation in mined-out areas. The downslope upward mining sequence exhibits the least fractal dimensions, indicating minimal disturbance to both strata and surface. While all five mining scenarios maintain good slope stability under normal conditions, recalibrated stability assessments based on fractal dimensions suggest that downslope upward mining offers the highest stability under rainfall, contrasting with the lower stability and potential instability risks of upslope downward mining. These insights are pivotal for mining operations and geological hazard mitigation in multi-seam coal exploitation on bedding slopes. 展开更多
关键词 Bedding rock landslides mining-induced deformation Bedding slope stability Underground mining sequences Fractal-based strength reduction method
原文传递
Analysis on probability of water inrush and quicksand in different mining sequences under an unconsolidated alluvium aquifer by fluid-solid coupling theory 被引量:1
2
《Journal of Coal Science & Engineering(China)》 2012年第1期60-66,共7页
To study the behavior of overlying strata and the likelihood of water inrush and quicksand with different mining sequences under an unconsolidated alluvium aquifer, a numerical model based on the fluid-solid coupling ... To study the behavior of overlying strata and the likelihood of water inrush and quicksand with different mining sequences under an unconsolidated alluvium aquifer, a numerical model based on the fluid-solid coupling theory was con- structed by FLAC3D. Simulation results revealed that the mining sequences had a significant influence on the seepage, dis- placement and failure characteristics of the overlying strata. In this kind of geological and hydrogeological conditions, the workface close to the outcrop of coal seam easily suffers from water inrush and quicksand during mining. In the simulation re- sults, the plastic zone, vertical displacement and pore water pressure in the overlying strata of the workface decrease more or less using the upward mining sequence than using the downward mining sequence. Therefore, the application of the upward mining sequence in the process of mining is preferential to prevent water inrush and quicksand. 展开更多
关键词 water inrush QUICKSAND mining sequences solid-fluid coupling
下载PDF
A Service Composition Approach Based on Sequence Mining for Migrating E-learning Legacy System to SOA 被引量:1
3
作者 Zhuo Zhang Dong-Dai Zhou +1 位作者 Hong-Ji Yang Shao-Chun Zhong 《International Journal of Automation and computing》 EI 2010年第4期584-595,共12页
With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there e... With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behaviour data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behaviour data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users' practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. In this paper, we propose a service composition approach based on sequence mining techniques for MELS. Composite services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of tile legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; meanwhile, some investigation questionnaires were set up to collect satisfaction data. The investigation result is 90% the same with the result obtained through our approach. 展开更多
关键词 Service composition E-LEARNING sequence mining algorithm service-oriented architecture (SOA) legacy system
下载PDF
Stability analysis of backflling in subsiding area and optimization of the stoping sequence 被引量:7
4
作者 Ping Wang Huiqiang Li +1 位作者 Yan Li Bo Cheng 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2013年第6期478-485,共8页
In underground mining by sublevel caving method, the deformation and damage of the surface induced by subsidence are the major challenging issues. The dynamic and soft backflling body increases the safety risks in the... In underground mining by sublevel caving method, the deformation and damage of the surface induced by subsidence are the major challenging issues. The dynamic and soft backflling body increases the safety risks in the subsiding area. In this paper, taking Zhangfushan iron mine as an example, the ore body and the general layout are focused on the safety of backflling of mined-out area. Then, we use the ANSYS software to construct a three-dimensional(3D) model for the mining area in the Zhangfushan iron mine. According to the simulation results of the initial mining stages, the ore body is stoped step by step as suggested in the design. The stability of the backflling is back analyzed based on the monitored displacements, considering the stress distribution to optimize the stoping sequence. The simulations show that a reasonable stoping sequence can minimize the concentration of high compressive stress and ensure the safety of stoping of the ore body. 展开更多
关键词 mining engineering Backflling body Numerical simulations Stability analysis Stoping sequence optimization
下载PDF
Comparative analysis of real-world data of frequent treatment sequences in metastatic prostate cancer
5
作者 Jiten Jaipuria Ishleen Kaur +5 位作者 Mohammad Najmud Doja Tanvir Ahmad Amitabh Singh Sudhir Kumar Rawal Vineet Talwar Girish Sharma 《Current Urology》 2024年第2期104-109,共6页
Background:The incidence of prostate cancer is increasing worldwide.A significant proportion of patients developmetastatic disease and are initially prescribed androgen deprivation therapy(ADT).However,subsequent sequ... Background:The incidence of prostate cancer is increasing worldwide.A significant proportion of patients developmetastatic disease and are initially prescribed androgen deprivation therapy(ADT).However,subsequent sequences of treatments in real-world settings that may improve overall survival remain an area of active investigation.Materials and methods:Data were collected from 384 patients presenting with de novo metastatic prostate cancer from 2011 to 2015 at a tertiary cancer center.Patients were categorized into surviving(n=232)and deceased(n=152)groups at the end of 3 years.Modified sequence pattern mining techniques(Generalized Sequential Pattern Mining and Sequential Pattern Discovery using Equivalence Classes)were applied to determine the exact order of the most frequent sets of treatments in each group.Results:Degarelix,as the initial form of ADT,was uniquely in the surviving group.The sequence of ADT followed by abiraterone and docetaxel was uniquely associated with a higher 3-year overall survival.Orchiectomy followed by fosfestrol was found to have a unique niche among surviving patients with a long duration of response to the initial ADT.Patients who received chemotherapy followed by radiotherapy and those who received radiotherapy followed by chemotherapy were found more frequently in the deceased group.Conclusions:We identified unique treatment sequences among surviving and deceased patients at the end of 3 years.Degarelix should be the preferred formof ADT.Patients who received ADT followed by abiraterone and chemotherapy showed better results.Patients requiring palliative radiation and chemotherapy in any sequence were significantlymore frequent in the deceased group,identifying the need to offer such patients the most efficacious agents and to target them in clinical trial design. 展开更多
关键词 Hormone therapy Metastatic prostate cancer sequence mining SURVIVAL
下载PDF
Abnormal Event Correlation and Detection Based on Network Big Data Analysis 被引量:2
6
作者 Zhichao Hu Xiangzhan Yu +1 位作者 Jiantao Shi Lin Ye 《Computers, Materials & Continua》 SCIE EI 2021年第10期695-711,共17页
With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack p... With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack patterns from massive data and detect attacks are urgent problems.In this paper,an approach for attack mining and detection is proposed that performs tasks of alarm correlation,false-positive elimination,attack mining,and attack prediction.Based on the idea of CluStream,the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering.The context of an alarm in the attack chain is analyzed and the LightGBM method is used to perform falsepositive recognition with high accuracy.To accelerate the search for the filtered alarm sequence data to mine attack patterns,the PrefixSpan algorithm is also updated in the store strategy.The updated PrefixSpan increases the processing efficiency and achieves a better result than the original one in experiments.With Bayesian theory,the transition probability for the sequence pattern string is calculated and the alarm transition probability table constructed to draw the attack graph.Finally,a long-short-term memory network and embedding word-vector method are used to perform online prediction.Results of numerical experiments show that the method proposed in this paper has a strong practical value for attack detection and prediction. 展开更多
关键词 Attack scene false positive alarm correlation sequence mining multi-step attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部