138 research outputs found

    Room-and-pillar mining of thick coal seams in the conditions of high gas dynamic hazard in Kuzbass

    Get PDF
    Room-and-pillar coal mining is effective in the areas unsuitable for fully mechanized longwalling. This mining method has advantages and disadvantages. The application of the room-and-pillar technique to mining of thick coal seams in the conditions of high gas dynamic hazard is face \d with such problems as impossibility of full-height extraction; heading without preliminary prediction of rock bursts and outbursts, or without early prevention of floor fracturing, etc. The ways to solve such problems in terms of coal mines in Kuzbass could be useful for mines in other regions

    Numerical Modelling of Whispering Gallery Modes in Parallel-plates Type Cylindrical Anisotropic Dielectric Resonators

    Get PDF
    A parallel-plates-type cylindrical anisotropic dielectric resonator (DR) with whispering gallery modes (WGMs) has been investigated. Numerical modelling of the resonance frequencies, Q-factors and the electric field filling factors of the isotropic and anisotropic DR are presented. Applications of the results for sensing purposes are discussed

    Whispering Gallery Mode Dielectric Resonators for the Millimeter Wave Near Field Sensing Applications

    Get PDF
    The resonance characteristics of whispering gallery modes (WGMs) in parallel-plate type cylindrical dielectric resonators (DRs) are numerically considered to optimise their characteristics for sensing applications. Results for the dependency of the resonant frequency, Q-factor, slow-down factor and electric energy filling factor of the modes on resonator parameters for both isotropic and anisotropic DR are presented. The possible applications of the results for millimeter wave near field nondestructive measurements are discussed

    Prospects for improvement of mining machines' cutting picks

    Get PDF
    Advantages and disadvantages of tangential rotary picks widely used in mining machines are described. A prospective line of picks design improvement has been found based on a change in the principle of destruction. A new design of blade-type cutting picks with a reinforcing tip is proposed having extended service life, requiring less energy for rock breaking, reducing yield of fine dust and increasing the grade of the mined coal

    Improved Operating Performance of Mining Machine Picks

    Get PDF
    The reasons of low performance of mining machine picks are stated herein. In order to improve the wear resistance and the cutting ability of picks a new design of a cutting carbide tip insert to be fixed on a removable and rotating pick head is developed. Owing to the new design, the tool ensures a twofold increase in the cutting force maintained longer, a twofold reduction in the specific power consumption of the breaking process, and extended service life of picks and the possibility of their multiple use

    Environmental Improvement Of Opencast Mining

    Get PDF
    Existing classifications of waste dumps in the quarries are given and their phenomenological nature is clarified. The need to identify the essence of the term "dump" is shown as well as the idea of "dump" as an artificial formation with everted and mixed rocks distanced from the quarry. Essential classification of man-made rock formations in quarries is developed. Characteristic of variations of man-made waste formations in quarries is developed. To reduce harmful effects of open-pit mining, dumps should be substituted with strat-lays - man-made structures relevant to natural stratification of litho-substances. Construction of strat-lays would improve ecological and technological culture of open cast mining

    Data distribution and asymmetry in leaf blade Prunus padus L.

    Get PDF
    To test the level of developmental stability of plants, an indicator of the asymmetry of their leaf blades is often used. The resulting systematic additive and multiplicative errors depend on the nature of the distribution sample data. On the example of bird cherry (Prunus padus L.) leaf blades, two types of distribution of sample data are demonstrated – normal and exponential. Statistical analyzes were performed in STATISTICA 10 (Stat.Ink). The exponential form of the distribution did not allow obtaining the mean value of the sample. The normalizing transformation of the sample contributed to obtaining the mean value and finding the relative level of the developmental stability of the population. In the Murmansk population (Apatity), a high variability of leaf blades was revealed, but, despite a significant asymmetry obtained in the normalizing difference formula, it did not have a statistically significant fluctuating asymmetry (FA). The sample from the Vladimir population (Vladimir) with the highest level of FA (0.018±0.004) was characterized by high values of kurtosis, skew and variance which was confirmed in a two-way analysis of variance (p <<0.05). In the Moscow population (Elektrostal) a high level of asymmetry was also obtained in the normalizing formula, but was not confirmed in a 2-way ANOVA. Thus, only the population from Vladimir showed a deviation in developmental stability in both methods. The authors recommend paying attention to the nature of the distribution of the difference between the left and right trait values, and using a two-way analysis of variance for the final determination of the FA value

    SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

    Get PDF
    The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ How to Cite: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ Indexing: &nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Розвиток сучасної світової спільноти тісно пов’язаний з досягненнями в області обчислювальних ресурсів і кіберпростору. Формування та розширення асортименту послуг базується на досягненнях людства у галузі високих технологій. Однак стрімке зростання обчислювальних ресурсів, поява повномасштабного квантового комп’ютера посилює вимоги до систем безпеки не тільки інформаційно-комунікаційних, але і до кіберфізичних систем і технологій. У першому розділі обговорюються методологічні основи побудови систем безпеки для об'єктів критичної інфраструктури на основі моделювання процесів поведінки антагоністичних агентів у систем безпеки. У другому розділі пропонується концепція інформаційної безпеки в соціальних мережах, яка заснована на математичних моделях захисту даних, з урахуванням впливу конкретних параметрів соціальної мережі та наслідків для неї. Враховуються нелінійні взаємозв'язки параметрів системи захисту, атак, соціальних мереж, а також вплив індивідуальних характеристик користувачів і характеру взаємовідносин між ними. У третьому розділі розглядаються практичні аспекти методології побудови постквантових алгоритмів для асиметричних криптосистем Мак-Еліса та Нідеррейтера на алгебраїчних кодах (еліптичних та модифікованих еліптичних кодах), їх математичні моделі та практичні алгоритми. Запропоновано гібридні конструкції криптокоду Мак-Еліса та Нідеррейтера на дефектних кодах. Вони дозволяють істотно знизити енергетичні витрати на реалізацію, забезпечуючи при цьому необхідний рівень криптографічної стійкості системи в цілому. Запропоновано концепцію безпеки корпоративних інформаційних та освітніх систем, які засновані на побудові адаптивної системи захисту інформації. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ Як цитувати: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ Індексація: &nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp

    The Development of Chora in the Cities of the Bosporus in the 6th — 1st Quarter of the 3rd Centuries B.C.

    No full text
    В работе изучена хора городов Боспора VI — 1-й четверти III вв. до н.э. как сельскохозяйственная округа с присущей ей системой наделов и определенной структурой поселений

    Resonance characteristics of whispering gallery modes in parallel-plates-type cylindrical dielectric resonators

    No full text
    In this paper, the results of analytical and numerical investigation of whispering gallery modes (WGMs) in parallel-plates-type cylindrical anisotropic and isotropic dielectric resonators are presented. The dependence of the WGMs' resonant frequency. Q-factor, and energy-filling factor upon resonator parameters for the wide range of the azimuthal index has been studied numerically. The optimization of resonator parameters for sensing applications is discussed
    corecore