Results 41 to 50 of about 3,112 (196)
A novel cavity contraction solution and multilayer shaft wall model were developed to analyze deep shaft stability, considering rock viscosity, support structures, and water pressure, with successful validation through a Hulusu Coal Mine case study.
Bin Chen +5 more
wiley +1 more source
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh +12 more
wiley +1 more source
Biometric Privacy Using Secret Image Sharing
Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and stability (i.e., no two persons in the world can have same iris).
A.T. Hashim, D.A. Noori
openaire +2 more sources
Cement infill shares compressive and shear stresses during loading, while interfacial friction hinders crack propagation and reduces stress concentration, improving the rock's load‐bearing capacity. Failure modes vary with crack inclination. Unfilled specimens show four modes.
Shihao Yuan +4 more
wiley +1 more source
The evolution of the temperature field and frozen wall under different fracture conditions was examined by an artificial ground freezing‐based thermal‐hydraulic coupled model. It was observed that fracture inclination affects the interaction extent of freezing pipes and fracture, while phase transition extent is the dominant factor for heat transfer in
Chenyi Zhang +9 more
wiley +1 more source
An analytical framework delivers a closed‐form stress solution for lined compressed air energy storage chambers, enabling the determination of the minimum safe burial depth. The solution quantitatively evaluates lining support effectiveness, offering a reliable tool for chamber design and optimization.
Zeyuan Sun +3 more
wiley +1 more source
B1 is bord width 1, B2 is bord width 2, L is the pillar length, W is the pillar width, red color and letter A represent the pillars, and white color and number 1 represent excavated areas. Pstress is the average pillar stress; σv is the vertical component of the virgin stress, MPa; and e is the areal extraction ratio. e = B o B o + B P ${\rm{e}}=\frac{{
Tawanda Zvarivadza +4 more
wiley +1 more source
Secret Image Sharing Using Shamir Secret Rule
Abstract - As digital communication expands, the security of concealed messages in images without damaging their visual perception has become a mandatory necessity in data security. This paper introduces a new method that couples Shamir's Secret Sharing Scheme (SSSS) with steganography to protect sensitive data inside digital images securely.
openaire +1 more source
This study demonstrates the feasibility of an underground closed‐loop thermal storage facility at a post‐mining site, intended for seasonal heat energy storage. Its principal design shows water flow directions in winter and summer (1, 2), heat pumps (3), an upper water reservoir (4), and connecting pipes (5).
Dmytro Rudakov, Oleksandr Inkin
wiley +1 more source
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection. [PDF]
Chang CC, Horng JH, Shih CS, Chang CC.
europepmc +1 more source

