Similar simulation experiment of expressway tunnel in karst area

2018 ◽  
Vol 176 ◽  
pp. 1-13 ◽  
Author(s):  
Qingyan Tian ◽  
Jiantong Zhang ◽  
Yanlong Zhang
2011 ◽  
Vol 26 ◽  
pp. 431-440 ◽  
Author(s):  
Liu Feifei ◽  
Lin Baiquan ◽  
Zhai Cheng ◽  
Li Ziwen ◽  
Li Fei ◽  
...  

2012 ◽  
Vol 535-537 ◽  
pp. 1940-1943
Author(s):  
Yong Yan Wang ◽  
Feng Li ◽  
Xiu Jiang Tai

This paper takes styrene-butadiene latex with 37% solid contents, the portland cement of number 45r and fine sands with 0.2mm diameter to prepared similar material, the mass ratio of cement and fine sand is fixed, different ratio of the specimens are prepared by adjusting the latex ratio. The MATLAB fitting and ANSYS simulation calculation are used to compare to the date of soft rock. The analysis shows that the latex cement can be used for deep soft rock rheology theory and polymer materials similar simulation experiment.


Author(s):  
A. Koto

The objective of this paper is to determine the optimum anaerobic-thermophilic bacterium injection (Microbial Enhanced Oil Recovery) parameters using commercial simulator from core flooding experiments. From the previous experiment in the laboratory, Petrotoga sp AR80 microbe and yeast extract has been injected into core sample. The result show that the experiment with the treated microbe flooding has produced more oil than the experiment that treated by brine flooding. Moreover, this microbe classified into anaerobic thermophilic bacterium due to its ability to live in 80 degC and without oxygen. So, to find the optimum parameter that affect this microbe, the simulation experiment has been conducted. The simulator that is used is CMG – STAR 2015.10. There are five scenarios that have been made to forecast the performance of microbial flooding. Each of this scenario focus on the injection rate and shut in periods. In terms of the result, the best scenario on this research can yield an oil recovery up to 55.7%.


Author(s):  
M. Safrudin ◽  
Sutaryat Trisnamansyah ◽  
Tb. Abin Syamsuddin Makmun ◽  
Deni Darmawan

The aimed of this studied was developed learning through computer-assisted as BCBL. Result of this studied have been stated that: (a) the potential of five high schools in Karawang districts supported the implementation of BCBL development, (b) planning of BCBL development through a systematic development stages from preparation, production, simulation, experiment, and publication, (c) the implementation result of BCBL learning through revision tested were learner activity and higher autonomy. Keywords: BCBL; Independence Self-reliance; Student Competence.


Author(s):  
Gang Li ◽  
Binren Zhang

Background: Electromagnetic detection is an important method of geophysical exploration. The transmitting system is an important part of the electromagnetic detection equipment. Methods: The general topologies of a transmitting system for EM instrument are analyzed. The basic principle of EM detection is interpreted. In order to improve the output power and give consideration to the dynamic performance, an electromagnetic transmitting system based on the tri-state boost converter is proposed in this paper. Results: The principle of the proposed transmitting system is analyzed. The topology of the proposed transmitting system is illustrated and the working modes of tri-state boost converter are given. Conclusion: The simulation model is established and the simulation experiment is carried out to verify the feasibility of the new electromagnetic transmitting system.


Author(s):  
Yuancheng Li ◽  
Pan Zhang ◽  
Daoxing Li ◽  
Jing Zeng

Background: Cloud platform is widely used in electric power field. Virtual machine co-resident attack is one of the major security threats to the existing power cloud platform. Objective: This paper proposes a mechanism to defend virtual machine co-resident attack on power cloud platform. Method: Our defense mechanism uses the DBSCAN algorithm to classify and output the classification results through the random forest and uses improved virtual machine deployment strategy which combines the advantages of random round robin strategy and maximum/minimum resource strategy to deploy virtual machines. Results: we made a simulation experiment on power cloud platform of State Grid and verified the effectiveness of proposed defense deployment strategy. Conclusion: After the virtual machine deployment strategy is improved, the coverage of the virtual machine is remarkably reduced which proves that our defense mechanism achieves some effect of defending the virtual machine from virtual machine co-resident attack.


Sign in / Sign up

Export Citation Format

Share Document