scholarly journals Analysis of Key Factors Affecting Water Disaster in Deep Mining and Establishment of a Water Disaster Evaluation Method Suitable for Different Mining Depths

Geofluids ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Jianghui He ◽  
Wenping Li ◽  
Wei Qiao ◽  
Zhi Yang ◽  
Qiqing Wang

Deep mining is the current and future mining focus in the coalfield of North China. Therefore, it is necessary to establish a water inrush assessment method suitable for deep mining. The conventional water inrush coefficient ( T ) method is simple to use, but its accuracy is low when the mining depth is very small or large because it neglects the role of the aquifer water yield. The main purpose of this paper is to introduce a simple water inrush risk assessment method that is more applicable in deep mining than the T method. In this study, the hydrogeological characteristics in deep mining were studied and the role of the aquifer water yield in water inrush was analyzed. Afterwards, an improved T method considering the aquifer specific yield ( q ) was established. In the new method, the critical water inrush coefficient changes with changing q following a negative correlation. The parameter thresholds were determined based on systematic data analyses of 186 mining cases. The results of the statistical analysis show that the accuracy of the new method at different mining depths is higher than that of the T method.

2011 ◽  
Vol 261-263 ◽  
pp. 1348-1354
Author(s):  
Chang Hong Li ◽  
Li Xin Zhang

In view of one-sidedness and the limitations in comprehensive evaluation index for water inrush risk, a variety of factors of water inrush induced by deep mining of Beiminghe iron mine are analyzed from hydrogeological characteristics, structural characteristics and mining. Faulted structure, water storage capacity, water pressure, water-resisting layer, miming effect and the change of stress in surrounding rock of two levels of deep mining in mine area are quantized by rock permeability test, field pumping test and finite element numerical analysis. Mathematic model of risk assessment of water inrush in deep mining of Beiminghe iron mine is established by using fuzzy comprehensive evaluation method. Quantitative assessment of water inrush risk is carried out to obtain the value of rank tendency for water inrush risk through that mathematic model.


2016 ◽  
Vol 11 (1) ◽  
pp. 75-85 ◽  
Author(s):  
Bo Li ◽  
Qiang Wu ◽  
Yulong Chen ◽  
Ganlu Wang ◽  
Lei Xu

Groundwater inrush in mines directly threatens safe coal production. Aquifer yield plays a crucial role during water inrush. Significant accidents occur in areas where aquifer yields are strong. The yield of an aquifer is influenced by many things and, in this study, five for which data are easily acquired were selected as evaluation indices for coal-seam floor aquifer yield. They comprise specific yield, permeability, drilling fluid consumption, aquifer thickness, and fault and fold distribution. Based on these indices, a comprehensive model for evaluating water yield was constructed. Using the Ordovician limestone aquifer below the coal floor of Danhou coal mine, Hebei province, China, as an example, index data relating to aquifer yield were collected and the index weight determined. A geographic information system was used to prepare a thematic map for each driving factor and, subsequently, to superimpose them. Comprehensive water yield evaluation indexes were obtained and, finally, a zonal map of different water yield properties was developed for the research area.


Author(s):  
Émilie Perez

The role of children in Merovingian society has long been downplayed, and the study of their graves and bones has long been neglected. However, during the past fifteen years, archaeologists have shown growing interest in the place of children in Merovingian society. Nonetheless, this research has not been without challenges linked to the nature of the biological and material remains. Recent analysis of 315 children’s graves from four Merovingian cemeteries in northern Gaul (sixth to seventh centuries) allows us to understand the modalities of burial ritual for children. A new method for classifying children into social age groups shows that the type, quality, quantity, and diversity of grave goods were directly correlated with the age of the deceased. They increased from the age of eight and particularly around the time of puberty. This study discusses the role of age and gender in the construction and expression of social identity during childhood in the Merovingian period.


2021 ◽  
pp. 1-27
Author(s):  
Anna Naszodi ◽  
Francisco Mendonca

Abstract We develop a method which assumes that marital preferences are characterized either by the scalar-valued measure proposed by Liu and Lu, or by the matrix-valued generalized Liu–Lu measure. The new method transforms an observed contingency table into a counterfactual table while preserving its (generalized) Liu–Lu value. After exploring some analytical properties of the new method, we illustrate its application by decomposing changes in the prevalence of homogamy in the US between 1980 and 2010. We perform this decomposition with two alternative transformation methods as well where both methods capture preferences differently from Liu and Lu. Finally, we use survey evidence to support our claim that out of the three considered methods, the new transformation method is the most suitable for identifying the role of marital preferences at shaping marriage patterns. These data are also in favor of measuring assortativity in preferences à la Liu and Lu.


Author(s):  
Vivek Charu ◽  
Paul B. Rosenberg ◽  
Lon S. Schneider ◽  
Lea T. Drye ◽  
Lisa Rein ◽  
...  

AbstractPhysicians and patients may choose a certain treatment only if it is predicted to have a large effect for the profile of that patient. We consider randomized controlled trials in which the clinical goal is to identify as many patients as possible that can highly benefit from the treatment. This is challenging with large numbers of covariate profiles, first, because the theoretical, exact method is not feasible, and, second, because usual model-based methods typically give incorrect results. Better, more recent methods use a two-stage approach, where a first stage estimates a working model to produce a scalar predictor of the treatment effect for each covariate profile; and a second stage estimates empirically a high-benefit group based on the first-stage predictor. The problem with these methods is that each of the two stages is usually agnostic about the role of the other one in addressing the clinical goal. We propose a method that characterizes highly benefited patients by linking model estimation directly to the particular clinical goal. It is shown that the new method has the following two key properties in comparison with existing approaches: first, the meaning of the solution with regard to the clinical goal is the same, and second, the value of the solution is the best that can be achieved when using the working model as a predictor, even if that model is incorrect. In the Citalopram for Agitation in Alzheimer’s Disease (CitAD) randomized controlled trial, the new method identifies substantially larger groups of highly benefited patients, many of whom are missed by the standard method.


Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1158-1167
Author(s):  
Jagadeesan S ◽  
Mani C ◽  
Sambasivam S ◽  
Jaisankar P ◽  
Sasikala S

In the brand new technology of cutting-edge technological know-how and era is advanced day via way of means of day. The information confidentiality is danger everywhere in the global and it will increase rapidly. Steganography and cryptography are very vital strategies applied in facts safety to cowl and steady mystery messages in transmitting facts. In this we launch, put in force and check a completely sole technique that can be used as a steady and extraordinarily budget friendly technique {of facts|of knowledge|} interest in addition to information extracting (Jagadeesan, S., 2020). Some efficiency parameters are going to be thru an test received and in comparison with opportunity current approaches parameters to show the efficiency of the deliberate technique. Here we proposes a brand new method to hiding the information the use of steganography strategies primarily based totally on AES and RC5 set of rules cryptosystem. The word Steganography is the splendor of hiding mystery information in the back of the photos, videos, sound and textual content to cowl the name of the game communication. Cryptosystem is the system which given our technique extra perfection. The visible first-class of the quilt photo certainly nice, nobody can consider it how personal information are transmitted the use of this technique. This suggest technique and set of rules ability is exceedingly bendy than different posted set of rules. The AES and RC5 set of rules has no more difficulty and it looks as if thoroughly to hiding the personal information.


Author(s):  
Daniel M. Sapozhnikov ◽  
Moshe Szyf

AbstractAlthough associations between DNA methylation and gene expression were established four decades ago, the causal role of DNA methylation in gene expression remains unresolved. Different strategies to address this question were developed; however, all are confounded and fail to disentangle cause and effect. We developed here a highly effective new method using only deltaCas9(dCas9):gRNA site-specific targeting to physically block DNA methylation at specific targets in the absence of a confounding flexibly-tethered enzymatic activity, enabling examination of the role of DNA methylation per se in living cells. We show that the extensive induction of gene expression achieved by TET/dCas9-based targeting vectors is confounded by DNA methylation-independent activities, inflating the role of DNA methylation in the promoter region. Using our new method, we show that in several inducible promoters, the main effect of DNA methylation is silencing basal promoter activity. Thus, the effect of demethylation of the promoter region in these genes is small, while induction of gene expression by different inducers is large and DNA methylation independent. In contrast, targeting demethylation to the pathologically silenced FMR1 gene targets robust induction of gene expression. We also found that standard CRISPR/Cas9 knockout generates a broad unmethylated region around the deletion, which might confound interpretation of CRISPR/Cas9 gene depletion studies. In summary, this new method could be used to reveal the true extent, nature, and diverse contribution to gene regulation of DNA methylation at different regions.


2018 ◽  
Vol 44 (08) ◽  
pp. 765-779 ◽  
Author(s):  
Sigrid Brækkan ◽  
John-Bjarne Hansen ◽  
Line Evensen

AbstractVenous thromboembolism (VTE) is a complex multifactorial disease that represents a growing public health concern. Identification of modifiable risk factors at the population level may provide a measure to reduce the burden of VTE. In this review, we summarize current knowledge of the role of physical activity on the risk of VTE and VTE-related complications. We also discuss methodological challenges related to research on physical activity, and put forward plausible mechanisms for an association between physical activity and VTE. Up to now, published studies have reported diverging results on the relationship between physical activity and VTE, and a complex picture has emerged. However, the available evidence appears to be balanced toward a small beneficial effect of physical activity on the risk of incident VTE, but not in a dose-dependent manner. Still, the lack of an operational definition and standardized assessment method for physical activity, as well as several sources of bias, impairs the interpretation of the available literature. Additional work is necessary to understand the role and how to apply physical activity in the VTE setting. Future research should utilize objective assessment strategies of physical activity and physical fitness, account for the fluctuating nature in habitual activity levels, and explore the role of physical activity in the areas of secondary prevention and VTE-related complications.


Sign in / Sign up

Export Citation Format

Share Document