![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
This book provides an information fusion model with information fusion theory, geographic information system technology and modern mathematical methods to evaluate the risks of groundwater inrushes from aquifers underlying coal seams. In this new model, the water inrush vulnerable index was calculated with variable weights theory. It overcomes the defect of the traditional vulnerability index method that assumes constant weights for the factors controlling the water inrush. Mine water inrush events often occur during coal mine construction and production; they account for a large proportion of the nation's coal mine disasters and accidents in China. Between 2005 and 2014, 513 water inrush incidents have occurred with a total loss of 2,753 lives. As mining depths and mining intensity continue to increase, the hydrogeological conditions encountered are becoming more complex. The innovative model presented here was applied to two coal mines in China with proved better results than the traditional vulnerability index method.
This book provides an information fusion model with information fusion theory, geographic information system technology and modern mathematical methods to evaluate the risks of groundwater inrushes from aquifers underlying coal seams. In this new model, the water inrush vulnerable index was calculated with variable weights theory. It overcomes the defect of the traditional vulnerability index method that assumes constant weights for the factors controlling the water inrush. Mine water inrush events often occur during coal mine construction and production; they account for a large proportion of the nation's coal mine disasters and accidents in China. Between 2005 and 2014, 513 water inrush incidents have occurred with a total loss of 2,753 lives. As mining depths and mining intensity continue to increase, the hydrogeological conditions encountered are becoming more complex. The innovative model presented here was applied to two coal mines in China with proved better results than the traditional vulnerability index method.
|
![]() ![]() You may like...
Key Person of Influence - The Five-Step…
Daniel Priestley
Paperback
![]()
Examining the Future of Advertising and…
Blanca Miguelez-Juan, Gema Bonales-Daimiel
Hardcover
R7,905
Discovery Miles 79 050
Impacts of Online Advertising on…
Tereza Semeradova, Petr Weinlich
Hardcover
R6,685
Discovery Miles 66 850
A Synergistic Framework for Hardware IP…
Meng Li, David Z. Pan
Hardcover
R2,873
Discovery Miles 28 730
Automotive Embedded Systems - Key…
M. Kathiresh, R. Neelaveni
Hardcover
R3,896
Discovery Miles 38 960
Advanced Direct Thrust Force Control of…
Muhammad Ali Masood Cheema, John Edward Fletcher
Hardcover
R4,583
Discovery Miles 45 830
|