Mining exploitation influence range
نویسندگان
چکیده
منابع مشابه
Impact of mining exploitation on pipelines
Article describes the issues related to the impact of underground mining exploitation on pipelines in Poland. For this purpose there was conducted the impact analysis of horizontal strains, curvatures and tilt changes of the surface on loads and displacements of these objects. Ground deformations can cause pipelines failures and thereby reduce their reliability. In addition, the examples of typ...
متن کاملStructInf: Mining Structural Influence from Social Streams
Social influence is a fundamental issue in social network analysis and has attracted tremendous attention with the rapid growth of online social networks. However, existing research mainly focuses on studying peer influence. This paper introduces a novel notion of structural influence and studies how to efficiently discover structural influence patterns from social streams. We present three sam...
متن کاملData mining of range-based classification rules for data characterization
Advances in data gathering have led to the creation of very large collections across different fields like industrial site sensor measurements or the account statuses of a financial institution’s clients. The ability to learn classification rules, rules that associate specific attribute values with a specific class label, from this data is important and useful in a range of applications. While ...
متن کاملModelling the Potential Biogas Productivity Range from a MSW Landfill for Its Sustainable Exploitation
A model of biogas generation was modified and applied to the case of a sanitary landfill in Italy. The modifications considered the role of the temperature field normally established within each layer of waste. It must be pointed out the temperature affects the anaerobic biodegradation kinetics. In order to assess the effect of moisture on the waste biodegradation rate, on the bacteria process ...
متن کاملInterpreter Exploitation
As remote exploits further dwindle and perimeter defenses become the standard, remote client-side attacks are becoming the standard vector for attackers. Modern operating systems have quelled the explosion of client-side vulnerabilities using mitigation techniques such as data execution prevention (DEP) and address space layout randomization (ASLR). This work illustrates two novel techniques to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Natural Hazards
سال: 2018
ISSN: 0921-030X,1573-0840
DOI: 10.1007/s11069-018-3450-5