Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in p...Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in plains due to multi-seam coal mining and the instability of natural bedding slopes, yet the cumulative impact of different mining sequences on bedding slopes has been less explored. This study combines drone surveys and geological data to construct a comprehensive three-dimensional model of bedding slopes. Utilizing FLAC3D and PFC2D models, derived from laboratory experiments, it simulates stress, deformation, and failure dynamics of slopes under various mining sequences. Incorporating fractal dimension analysis, the research evaluates the stability of slopes in relation to different mining sequences. The findings reveal that mining in an upslope direction minimizes disruption to overlying strata. Initiating extraction from lower segments increases tensile-shear stress in coal pillar overburdens, resulting in greater creep deformation towards the downslope than when starting from upper segments, potentially leading to localized landslides and widespread creep deformation in mined-out areas. The downslope upward mining sequence exhibits the least fractal dimensions, indicating minimal disturbance to both strata and surface. While all five mining scenarios maintain good slope stability under normal conditions, recalibrated stability assessments based on fractal dimensions suggest that downslope upward mining offers the highest stability under rainfall, contrasting with the lower stability and potential instability risks of upslope downward mining. These insights are pivotal for mining operations and geological hazard mitigation in multi-seam coal exploitation on bedding slopes.展开更多
To study the behavior of overlying strata and the likelihood of water inrush and quicksand with different mining sequences under an unconsolidated alluvium aquifer, a numerical model based on the fluid-solid coupling ...To study the behavior of overlying strata and the likelihood of water inrush and quicksand with different mining sequences under an unconsolidated alluvium aquifer, a numerical model based on the fluid-solid coupling theory was con- structed by FLAC3D. Simulation results revealed that the mining sequences had a significant influence on the seepage, dis- placement and failure characteristics of the overlying strata. In this kind of geological and hydrogeological conditions, the workface close to the outcrop of coal seam easily suffers from water inrush and quicksand during mining. In the simulation re- sults, the plastic zone, vertical displacement and pore water pressure in the overlying strata of the workface decrease more or less using the upward mining sequence than using the downward mining sequence. Therefore, the application of the upward mining sequence in the process of mining is preferential to prevent water inrush and quicksand.展开更多
With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there e...With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behaviour data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behaviour data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users' practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. In this paper, we propose a service composition approach based on sequence mining techniques for MELS. Composite services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of tile legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; meanwhile, some investigation questionnaires were set up to collect satisfaction data. The investigation result is 90% the same with the result obtained through our approach.展开更多
In underground mining by sublevel caving method, the deformation and damage of the surface induced by subsidence are the major challenging issues. The dynamic and soft backflling body increases the safety risks in the...In underground mining by sublevel caving method, the deformation and damage of the surface induced by subsidence are the major challenging issues. The dynamic and soft backflling body increases the safety risks in the subsiding area. In this paper, taking Zhangfushan iron mine as an example, the ore body and the general layout are focused on the safety of backflling of mined-out area. Then, we use the ANSYS software to construct a three-dimensional(3D) model for the mining area in the Zhangfushan iron mine. According to the simulation results of the initial mining stages, the ore body is stoped step by step as suggested in the design. The stability of the backflling is back analyzed based on the monitored displacements, considering the stress distribution to optimize the stoping sequence. The simulations show that a reasonable stoping sequence can minimize the concentration of high compressive stress and ensure the safety of stoping of the ore body.展开更多
Background:The incidence of prostate cancer is increasing worldwide.A significant proportion of patients developmetastatic disease and are initially prescribed androgen deprivation therapy(ADT).However,subsequent sequ...Background:The incidence of prostate cancer is increasing worldwide.A significant proportion of patients developmetastatic disease and are initially prescribed androgen deprivation therapy(ADT).However,subsequent sequences of treatments in real-world settings that may improve overall survival remain an area of active investigation.Materials and methods:Data were collected from 384 patients presenting with de novo metastatic prostate cancer from 2011 to 2015 at a tertiary cancer center.Patients were categorized into surviving(n=232)and deceased(n=152)groups at the end of 3 years.Modified sequence pattern mining techniques(Generalized Sequential Pattern Mining and Sequential Pattern Discovery using Equivalence Classes)were applied to determine the exact order of the most frequent sets of treatments in each group.Results:Degarelix,as the initial form of ADT,was uniquely in the surviving group.The sequence of ADT followed by abiraterone and docetaxel was uniquely associated with a higher 3-year overall survival.Orchiectomy followed by fosfestrol was found to have a unique niche among surviving patients with a long duration of response to the initial ADT.Patients who received chemotherapy followed by radiotherapy and those who received radiotherapy followed by chemotherapy were found more frequently in the deceased group.Conclusions:We identified unique treatment sequences among surviving and deceased patients at the end of 3 years.Degarelix should be the preferred formof ADT.Patients who received ADT followed by abiraterone and chemotherapy showed better results.Patients requiring palliative radiation and chemotherapy in any sequence were significantlymore frequent in the deceased group,identifying the need to offer such patients the most efficacious agents and to target them in clinical trial design.展开更多
With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack p...With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack patterns from massive data and detect attacks are urgent problems.In this paper,an approach for attack mining and detection is proposed that performs tasks of alarm correlation,false-positive elimination,attack mining,and attack prediction.Based on the idea of CluStream,the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering.The context of an alarm in the attack chain is analyzed and the LightGBM method is used to perform falsepositive recognition with high accuracy.To accelerate the search for the filtered alarm sequence data to mine attack patterns,the PrefixSpan algorithm is also updated in the store strategy.The updated PrefixSpan increases the processing efficiency and achieves a better result than the original one in experiments.With Bayesian theory,the transition probability for the sequence pattern string is calculated and the alarm transition probability table constructed to draw the attack graph.Finally,a long-short-term memory network and embedding word-vector method are used to perform online prediction.Results of numerical experiments show that the method proposed in this paper has a strong practical value for attack detection and prediction.展开更多
基金funded by the Sichuan Science and Technology Program (grant number 2022NSFSC1176)the open Fund for National Key Laboratory of Geological Disaster Prevention and Environmental Protection (grant number SKLGP2022K027)the State Key Laboratory of Geohazard Prevention and Geoenvironment Protection Independent Research Project (SKLGP2022Z001)。
文摘Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in plains due to multi-seam coal mining and the instability of natural bedding slopes, yet the cumulative impact of different mining sequences on bedding slopes has been less explored. This study combines drone surveys and geological data to construct a comprehensive three-dimensional model of bedding slopes. Utilizing FLAC3D and PFC2D models, derived from laboratory experiments, it simulates stress, deformation, and failure dynamics of slopes under various mining sequences. Incorporating fractal dimension analysis, the research evaluates the stability of slopes in relation to different mining sequences. The findings reveal that mining in an upslope direction minimizes disruption to overlying strata. Initiating extraction from lower segments increases tensile-shear stress in coal pillar overburdens, resulting in greater creep deformation towards the downslope than when starting from upper segments, potentially leading to localized landslides and widespread creep deformation in mined-out areas. The downslope upward mining sequence exhibits the least fractal dimensions, indicating minimal disturbance to both strata and surface. While all five mining scenarios maintain good slope stability under normal conditions, recalibrated stability assessments based on fractal dimensions suggest that downslope upward mining offers the highest stability under rainfall, contrasting with the lower stability and potential instability risks of upslope downward mining. These insights are pivotal for mining operations and geological hazard mitigation in multi-seam coal exploitation on bedding slopes.
文摘To study the behavior of overlying strata and the likelihood of water inrush and quicksand with different mining sequences under an unconsolidated alluvium aquifer, a numerical model based on the fluid-solid coupling theory was con- structed by FLAC3D. Simulation results revealed that the mining sequences had a significant influence on the seepage, dis- placement and failure characteristics of the overlying strata. In this kind of geological and hydrogeological conditions, the workface close to the outcrop of coal seam easily suffers from water inrush and quicksand during mining. In the simulation re- sults, the plastic zone, vertical displacement and pore water pressure in the overlying strata of the workface decrease more or less using the upward mining sequence than using the downward mining sequence. Therefore, the application of the upward mining sequence in the process of mining is preferential to prevent water inrush and quicksand.
基金supported by E-learning Platform, National Torch Project (No. z20040010)
文摘With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behaviour data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behaviour data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users' practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. In this paper, we propose a service composition approach based on sequence mining techniques for MELS. Composite services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of tile legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; meanwhile, some investigation questionnaires were set up to collect satisfaction data. The investigation result is 90% the same with the result obtained through our approach.
文摘In underground mining by sublevel caving method, the deformation and damage of the surface induced by subsidence are the major challenging issues. The dynamic and soft backflling body increases the safety risks in the subsiding area. In this paper, taking Zhangfushan iron mine as an example, the ore body and the general layout are focused on the safety of backflling of mined-out area. Then, we use the ANSYS software to construct a three-dimensional(3D) model for the mining area in the Zhangfushan iron mine. According to the simulation results of the initial mining stages, the ore body is stoped step by step as suggested in the design. The stability of the backflling is back analyzed based on the monitored displacements, considering the stress distribution to optimize the stoping sequence. The simulations show that a reasonable stoping sequence can minimize the concentration of high compressive stress and ensure the safety of stoping of the ore body.
文摘Background:The incidence of prostate cancer is increasing worldwide.A significant proportion of patients developmetastatic disease and are initially prescribed androgen deprivation therapy(ADT).However,subsequent sequences of treatments in real-world settings that may improve overall survival remain an area of active investigation.Materials and methods:Data were collected from 384 patients presenting with de novo metastatic prostate cancer from 2011 to 2015 at a tertiary cancer center.Patients were categorized into surviving(n=232)and deceased(n=152)groups at the end of 3 years.Modified sequence pattern mining techniques(Generalized Sequential Pattern Mining and Sequential Pattern Discovery using Equivalence Classes)were applied to determine the exact order of the most frequent sets of treatments in each group.Results:Degarelix,as the initial form of ADT,was uniquely in the surviving group.The sequence of ADT followed by abiraterone and docetaxel was uniquely associated with a higher 3-year overall survival.Orchiectomy followed by fosfestrol was found to have a unique niche among surviving patients with a long duration of response to the initial ADT.Patients who received chemotherapy followed by radiotherapy and those who received radiotherapy followed by chemotherapy were found more frequently in the deceased group.Conclusions:We identified unique treatment sequences among surviving and deceased patients at the end of 3 years.Degarelix should be the preferred formof ADT.Patients who received ADT followed by abiraterone and chemotherapy showed better results.Patients requiring palliative radiation and chemotherapy in any sequence were significantlymore frequent in the deceased group,identifying the need to offer such patients the most efficacious agents and to target them in clinical trial design.
基金This work is supported by the National Key R&D Program of China(2016QY05X1000)the National Natural Science Foundation of China(Grant No.201561402137).
文摘With the continuous development of network technology,various large-scale cyber-attacks continue to emerge.These attacks pose a severe threat to the security of systems,networks,and data.Therefore,how to mine attack patterns from massive data and detect attacks are urgent problems.In this paper,an approach for attack mining and detection is proposed that performs tasks of alarm correlation,false-positive elimination,attack mining,and attack prediction.Based on the idea of CluStream,the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering.The context of an alarm in the attack chain is analyzed and the LightGBM method is used to perform falsepositive recognition with high accuracy.To accelerate the search for the filtered alarm sequence data to mine attack patterns,the PrefixSpan algorithm is also updated in the store strategy.The updated PrefixSpan increases the processing efficiency and achieves a better result than the original one in experiments.With Bayesian theory,the transition probability for the sequence pattern string is calculated and the alarm transition probability table constructed to draw the attack graph.Finally,a long-short-term memory network and embedding word-vector method are used to perform online prediction.Results of numerical experiments show that the method proposed in this paper has a strong practical value for attack detection and prediction.