Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Zhenxue Wang"'
Publikováno v:
Meitan kexue jishu, Vol 51, Iss 11, Pp 104-118 (2023)
Underground coal seam mining causes the deformation, failure, and collapse of the overlying rock mass of the coal seam. Suppose the monitoring and early warning of overburden deformation and failure during mining or the emergency response are inappro
Externí odkaz:
https://doaj.org/article/d20df6b89c3a4d52aa04b04406273db8
Publikováno v:
Molecules, Vol 29, Iss 15, p 3651 (2024)
Microstructured reactors offer fast chemical engineering transfer and precise microfluidic control, enabling the determination of reactions’ kinetic parameters. This review examines recent advancements in measuring microreaction kinetics. It explor
Externí odkaz:
https://doaj.org/article/aa5c7fecd25d44408bfdfc659456cb4d
Publikováno v:
Sensors, Vol 23, Iss 13, p 5947 (2023)
Underground coal mining can cause the deformation, failure, and collapse of the overlying rock mass of a coal seam. If the mining design, monitoring, early warning, or emergency disposal are improper, in that case, it can often lead to mining disaste
Externí odkaz:
https://doaj.org/article/0b543ebf716945b9b59be898d385106d
Publikováno v:
Sensors; Volume 23; Issue 13; Pages: 5947
Underground coal mining can cause the deformation, failure, and collapse of the overlying rock mass of a coal seam. If the mining design, monitoring, early warning, or emergency disposal are improper, in that case, it can often lead to mining disaste
Publikováno v:
Information Sciences. 577:245-264
To address the incomplete information dynamic network attack and defense game in practice, this paper proposes a generalized approach to solve for perfect Bayesian Nash equilibrium (BNE) for practical network attack and defense. To consider “role-s
Publikováno v:
The Proceedings of the International Conference on Power Engineering (ICOPE). :2021-0124
Experimental Study on Overlying Strata Deformation and Failure Using Distributed Intelligent Sensing
Publikováno v:
Lecture Notes in Civil Engineering ISBN: 9789811699627
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::206f6dd36f2392e2c6864333756750a7
https://doi.org/10.1007/978-981-16-9963-4_25
https://doi.org/10.1007/978-981-16-9963-4_25
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030242701
ICAIS (3)
ICAIS (3)
Taking the strategy combination of attack and defense as the basic parameter, Dematel method (decision test and experiment evaluation method) is introduced to analyze the causal relationship between attack strategies and defense strategies by constru
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::494b19ab70a7b77d9194bc8a6ee1f6d5
https://doi.org/10.1007/978-3-030-24271-8_50
https://doi.org/10.1007/978-3-030-24271-8_50
Publikováno v:
KSII Transactions on Internet & Information Systems; Oct2019, Vol. 13 Issue 10, p5260-5275, 16p, 3 Diagrams, 2 Charts