Zobrazeno 1 - 10
of 347
pro vyhledávání: '"LI Junmei"'
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
This paper combines the synergistic development logic of the accounting professional group, modeling the virtual simulation accounting professional group practical training scene through 3DMAX software, followed by particle swarm algorithms for sched
Externí odkaz:
https://doaj.org/article/ff1a80f7ad774752b61cefd71743a98b
Autor:
CHEN Qing, YUAN Bingqiang, HUANG Xiaoyu, LI Junmei, CHEN Hao, DING Chengyi, SUN Shuai, QIN Wen
Publikováno v:
Dizhi lixue xuebao, Vol 27, Iss 6, Pp 928-937 (2021)
The southeast of the Anza Basin in Kenya, located in the East African Rift System, has developed a very thick Mesozoic and Cenozoic sedimentary cover. However, the low level of exploration in this area restricts us from understanding its structural s
Externí odkaz:
https://doaj.org/article/c2f14ba1a8534b40a994341063857153
Publikováno v:
E3S Web of Conferences, Vol 356, p 02047 (2022)
The influences of the slope composition on both sides of the variable slope point and the opening numbers of the exhaust vent on the smoke diffusion and the smoke and heat exhaust efficiency in V-shaped tunnel were investigated by the numerical metho
Externí odkaz:
https://doaj.org/article/2292f8c6c98d4d41a978bc383de0222d
Publikováno v:
E3S Web of Conferences, Vol 356, p 02012 (2022)
The turbine floor of the main plant is an important part in an underground pumped storage hydropower plants.The health of personnel and the safe operation of equipment are endangered due to high space humidity and water seepage through the walls. In
Externí odkaz:
https://doaj.org/article/b8455334e1724ba49995d3731ece2826
Publikováno v:
E3S Web of Conferences, Vol 356, p 02034 (2022)
In this paper, numerical simulations are conducted to study the smoke diffusion characteristics in the V-shaped slope tunnel with different slopes. The smoke diffusion characteristics and the ceiling temperature distribution with three kinds of heat
Externí odkaz:
https://doaj.org/article/f6652f3125a2453f9e7a29ae19cd4543
Publikováno v:
ITM Web of Conferences, Vol 24, p 02003 (2019)
In order to identify the threat of computer network security and evaluate its fragility comprehensively, the related factors of network security are studied, and the methods based on attack graph are improved. Based on the attribute attack graph, the
Externí odkaz:
https://doaj.org/article/ee94633a956d4fb59459ec43cad64de5
Autor:
Tu, Dengkai1 (AUTHOR) tudengkai@emails.bjut.edu.cn, Li, Junmei1 (AUTHOR) lijunmei@bjut.edu.cn, Li, Yanfeng1 (AUTHOR), Xu, Desheng1 (AUTHOR)
Publikováno v:
Fire (2571-6255). Oct2024, Vol. 7 Issue 10, p363. 20p.
Autor:
Li, Junmei, Yuan, Ningqiu, Zhai, Yunyi, Wang, Minghui, Hao, Mingyue, Liu, Xiaofang, Zhou, Dong, Liu, Wei, Jin, Yaping, Wang, Aihua
Publikováno v:
In International Immunopharmacology 5 December 2024 142 Part A
Publikováno v:
In Tunnelling and Underground Space Technology incorporating Trenchless Technology Research December 2024 154
Publikováno v:
In Energy 15 October 2024 306