نتایج جستجو برای: tunnel support
تعداد نتایج: 690999 فیلتر نتایج به سال:
the selection of optimum support system is a key step in the successful design operation of tunneling, rock mass stabilization and minimization of plastic zone extension around a tunnel. in this context, it is not sufficient to rely only on the experiences of design engineers, but taking all effective measures and parameters is necessary to do a proper choice. in this paper, multi attribute dec...
this paper addresses the problem of quantifying the mechanical contribution of rockbolts installed systematically around tunnels (regularly spaced around the tunnel) excavated in rock masses. assuming that the mechanical contribution of grouted rockbolts is that of increasing internal pressure within a broken rock mass, a new procedure for computation of ground response curves for a circular tu...
The BGP Encapsulation Subsequent Address Family Identifier (SAFI) provides a method for the dynamic exchange of encapsulation information and for the indication of encapsulation protocol types to be used for different next hops. Currently, support for Generic Routing Encapsulation (GRE), Layer 2 Tunneling Protocol (L2TPv3), and IP in IP tunnel types are defined. This document defines support fo...
The carpal tunnel in the wrist is formed by the interconnected carpal bones and the transverse carpal ligament (TCL). The tunnel contents include the median nerve, which is susceptible to entrapment in the space-limited tunnel leading to carpal tunnel syndrome (CTS). CTS patients have increased flattening of the median nerve which is alleviated after surgically transecting the TCL to increase c...
This paper deals with full face excavation of large size tunnels in rock masses of very poor quality which exhibit squeezing problems. Three different time dependent constitutive models of increasing complexity (a viscoelasticplastic model, an elastic-viscoplastic model, and an elastic-plastic-viscoplastic model) are used to analyze the tunnel response during excavation of the Saint Martin La P...
Many applications of tunneling protocols such as PPTP [5] and L2TP [4] involve dial-up network access. Some, such as the provision of secure access to corporate intranets via the Internet, are characterized by voluntary tunneling: the tunnel is created at the request of the user for a specific purpose. Other applications involve compulsory tunneling: the tunnel is created without any action fro...
This paper describes a kernel interface that provides an untrusted user-level process (an executive) with protected access to memory management functions, including the ability to create, manipulate, and execute within subservient contexts (address spaces). Page motion callbacks not only give the executive limited control over physical memory management, but also shift certain responsibilities ...
This paper addresses the problem of quantifying the mechanical contribution of rockbolts installed systematically around tunnels (regularly spaced around the tunnel) excavated in rock masses. Assuming that the mechanical contribution of grouted rockbolts is that of increasing internal pressure within a broken rock mass, a new procedure for computation of ground response curves for a circular tu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید