نتایج جستجو برای: blasting

تعداد نتایج: 1816  

Journal: :Minerals 2022

For San-Xin gold and copper mine, deep blasting large block rate is high resulting in difficulty transporting the ore out; secondary not only increases costs but more likely to cause top bottom plate of underground become loose causing safety hazards. Based on research background Sanxin hole parameters were determined by single-hole, variable-hole pitch, oblique tests, further using inversion m...

Journal: :Geomechanics and geophysics for geo-energy and geo-resources 2022

Bunch-holes blasting (several blastholes arranged in a bunch with short spacing and detonated simultaneously to form large common crater) is typically used underground mines increase efficiency under single free surface. Considering the low accuracy of pyrotechnic detonators, which are commonly Chinese mines, bunch-holes same nominal times actually short-delay blasting, actual delay intervals i...

Journal: :Metals 2022

In order to reduce the blasting dust concentration in tunnel during drilling and blasting, accelerate excavation process, improve working environment for construction workers, a three-dimensional geometric model of transport was established based on gas-solid two-phase flow using DesginModeler software, discrete phase (DPM) FLUENT software used simulate variation distribution particle size at d...

Journal: :E3S web of conferences 2021

The article provides an analysis of Russian and Australian national documentation on occupational safety industrial for toxic post-blast gases. main purpose the is to present results research need a recognized document that would be appropriate all countries conducting open cut blasting. was performed with two spheres mine in mind, such as health establish standards environmental exposure harmf...

Journal: :Journal of the Construction Division 1961

Journal: :IOP Conference Series: Materials Science and Engineering 2021

Journal: :Lecture Notes in Computer Science 2023

Abstract Zero Knowledge Proofs (ZKPs) are cryptographic protocols by which a prover convinces verifier of the truth statement without revealing any other information. Typically, statements expressed in high-level language and then compiled to low-level representation on ZKP operates. Thus, bug compiler can compromise that ZK proof is supposed establish. This paper takes step towards correctness...

2014
Yoav Fekete Michael Codish

We present an encoding of pseudo-Boolean constraints based on decomposition with respect to a residual number system. We illustrate that careful selection of the base for the residual number system, and when bit-blasting modulo arithmetic, results in a powerful approach when solving hard pseudo-Boolean constraints. We demonstrate, using a range of pseudo-Boolean constraint solvers, that the obt...

Journal: :Journal of Rock Mechanics and Geotechnical Engineering 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید