Results 41 to 50 of about 3,112 (196)

Semi‐analytical solution for the stability of deep vertical shaft considering time‐dependent rock‐structure interaction

open access: yesDeep Underground Science and Engineering, EarlyView.
A novel cavity contraction solution and multilayer shaft wall model were developed to analyze deep shaft stability, considering rock viscosity, support structures, and water pressure, with successful validation through a Hulusu Coal Mine case study.
Bin Chen   +5 more
wiley   +1 more source

Strengthening urban resilience in China through underground infrastructures management: Addressing global climate challenges with technological solutions

open access: yesDeep Underground Science and Engineering, EarlyView.
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh   +12 more
wiley   +1 more source

Biometric Privacy Using Secret Image Sharing

open access: yesEngineering and Technology Journal, 2017
Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and stability (i.e., no two persons in the world can have same iris).
A.T. Hashim, D.A. Noori
openaire   +2 more sources

Study on the composite fracture characteristics of filling and reinforcing cracked rock mass after high temperature damage

open access: yesDeep Underground Science and Engineering, EarlyView.
Cement infill shares compressive and shear stresses during loading, while interfacial friction hinders crack propagation and reduces stress concentration, improving the rock's load‐bearing capacity. Failure modes vary with crack inclination. Unfilled specimens show four modes.
Shihao Yuan   +4 more
wiley   +1 more source

Numerical simulation study on the evolution of the temperature field and frozen wall in fractured rock mass

open access: yesDeep Underground Science and Engineering, EarlyView.
The evolution of the temperature field and frozen wall under different fracture conditions was examined by an artificial ground freezing‐based thermal‐hydraulic coupled model. It was observed that fracture inclination affects the interaction extent of freezing pipes and fracture, while phase transition extent is the dominant factor for heat transfer in
Chenyi Zhang   +9 more
wiley   +1 more source

Analytical stress solution framework for lined compressed air energy storage chambers and its application to safe burial depth determination and supporting effectiveness evaluation

open access: yesDeep Underground Science and Engineering, EarlyView.
An analytical framework delivers a closed‐form stress solution for lined compressed air energy storage chambers, enabling the determination of the minimum safe burial depth. The solution quantitatively evaluates lining support effectiveness, offering a reliable tool for chamber design and optimization.
Zeyuan Sun   +3 more
wiley   +1 more source

Advancing mine pillar design: Evaluating traditional methods and integrating AI for enhanced stability of pillars in the Great Dyke, Zimbabwe

open access: yesDeep Underground Science and Engineering, EarlyView.
B1 is bord width 1, B2 is bord width 2, L is the pillar length, W is the pillar width, red color and letter A represent the pillars, and white color and number 1 represent excavated areas. Pstress is the average pillar stress; σv is the vertical component of the virgin stress, MPa; and e is the areal extraction ratio. e = B o B o + B P ${\rm{e}}=\frac{{
Tawanda Zvarivadza   +4 more
wiley   +1 more source

Secret Image Sharing Using Shamir Secret Rule

open access: yesINTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Abstract - As digital communication expands, the security of concealed messages in images without damaging their visual perception has become a mandatory necessity in data security. This paper introduces a new method that couples Shamir's Secret Sharing Scheme (SSSS) with steganography to protect sensitive data inside digital images securely.
openaire   +1 more source

Performance assessment of a potential underground thermal storage facility: Case study of the closed mine Prosper‐Haniel in the Ruhr coal mining area in Germany

open access: yesDeep Underground Science and Engineering, EarlyView.
This study demonstrates the feasibility of an underground closed‐loop thermal storage facility at a post‐mining site, intended for seasonal heat energy storage. Its principal design shows water flow directions in winter and summer (1, 2), heat pumps (3), an upper water reservoir (4), and connecting pipes (5).
Dmytro Rudakov, Oleksandr Inkin
wiley   +1 more source

Home - About - Disclaimer - Privacy