What this thesis studies is to protect the security mining method under the condition of thickness collapsible loss.
本文所研究的就是巨厚湿陷性黄土层条件下保护地表安全的开采方法。
At the moment, this process costs more than ten times as much as conventional mining, but some countries might regard that as a small price to pay for security of supply.
目前来说,这个工艺的成本要十倍于传统的开采铀矿,不过一些国家可能会把它看作是为供应安全而付出的小小代价。
My research areas include, but are not limited to, databases, data mining, security, social networks, Internet applications and some mathematics.
我应该会在2010年毕业。我的研究领域包括:数据库、数据挖掘、安全、社会网络、互联网应用以及数学和其他。
The security situation at Aynak is better than at many other potential mining sites, but there are other problems. Water is scarce and inspires fierce tribal rivalry.
与许多其它潜在的矿藏点相比,Aynak的安全局势要好一些,但是那里还有其它问题:缺水和由此激起的严重的部落敌对。
However, as the amount of the log audit date is too large, we can apply data mining technology into security mode rule extraction.
但由于这些日志审计数据量非常庞大,因此采用数据挖掘技术从中进行安全模式规则的提取。
Mining the ore in pillars above the mine-out area comes down to the security of production, mining methods and putting in practice.
采空区上部预留矿柱的回采工作影响到整个矿山的安全生产、采矿方法及其实施。
Echoing the debates now common in western societies, many in China are beginning to bristle at the intrusiveness of nosy employers, data-mining marketers and ubiquitous security cameras.
受西方现今司空见惯的辩论的影响,很多中国人开始发泄对八卦的老板,窃取私人信息的商人和无处不在的安全摄像头的怨气。
The model integrates one backup-restore and data mining module for the data of security audit.
该模型针对安全审计数据,融合了一个备份恢复和数据挖掘模块。
The impacts on the security of Xifeihe River left embankment under coal mining are evaluated with elastoplastic model, two-exponent rheological model and probability integral method.
然后利用数值模拟软件中的弹塑性模型和流变模型及概率积分法开展煤层开采对西淝河左大堤安全的影响评价。
Data mining is emerging as one of the key features of many American homeland security bills.
数据挖掘的出现是美国许多本土安全法案的重要特征之一。
Analysis of real-time financial data, process control, rule observance, security application are fields in which data mining based embedded mobile database can be used.
金融数据的实时分析,过程控制,规章的遵守,安全应用这些都是基于嵌入式数据库的数据挖掘可以应用的领域。
Large areas of emptied stopes pose great dangers to the security production upon decades of mining.
某钨矿经过几十年开采留下大量采空区,并存在较大安全隐患。
Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
It is proposed to decrease exposure time of mining excavation to minimum and fill the excavation quickly using new filling method for security.
为确保采矿安全,减少采场空顶时间,采用了“强采快充”方法,并提出了快速充填具体办法。
Discussing the research method that resolve the adaptation of security system using distributed object technique and data mining.
探讨了利用分布式对象技术和数据挖掘技术来解决网络安全系统自适应性的研究思路。
The technique of intrusion detection based on data mining is a hot research to network security.
基于数据挖掘的入侵检测技术是当前网络安全研究的一个热点。
If the mined zone go into the security coal pillar, the house crack could be thought caused by mining.
房屋裂缝是否由煤矿采煤引起,主要是看采空区是否进入村庄保安煤柱。
In order to solve these problems, the dissertation works out a scheme of the network security audit based on data mining and realizes it.
为了解决这些问题,本文提出了基于数据挖掘的网络安全审计系统的方案并加以实现。
What's more, all the products in our corporation have got the certification from the nation mining security.
我公司所生产的所有规格的隔爆型硫化接头机均已取得国家煤矿安全认证。
Because this system only transfer the middle results of data mining, it reduces the transferred data greatly and strengths the security and privacy of the data.
因为本系统只传送数据挖掘的中间结果,所以大大减少了网络的数据传输量,并加强了数据的安全性和保密性。
So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.
为此,本文对企业安全管理方法和机制进行了研究,提出了一种新型的、分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心。
Secondly, it puts forward a solution of network security audit based on data mining and builds a system model to solve the problems existing in current network security audit.
其次根据目前网络安全审计中存在的问题提出了基于数据挖掘的网络安全审计系统的实现方案并建立了系统模型图。
The right of mining is a sort of the qualified right in rem, and it contains usufructuary right and security interest.
采矿权是他物权,是用益物权和担保物权的统一。
Mining at the requirement of network security analysis, a flexible method to generate attack graph is presented.
针对网络安全分析研究的要求,在已有研究的基础上,提出了一种灵活的网络攻击图生成方法。
Therefore, setting up security cultural system, promoting security supervision is the most important task for mining companies and the related administration.
建设安全文化体系、提高安全管理水平是煤矿企业及其相关管理部门的重要任务。
On this basis, further information on the classic frequent pattern mining algorithm and income security systems of telecommunications architecture is introduced.
在此基础上,进一步介绍了频繁模式挖掘的经典算法以及电信收入保障系统的体系结构。
For the scurviness of mining system, the security environment of mining system is focus of people.
当前由于矿井所处的恶劣环境,矿井生产安全一直是人们十分关注的问题。
It can also determine the evaluation index membership of systemic security according to the setting system-level structure based on the mining systemic characters of Tonglushan mine.
按充填采矿法系统特征建立铜绿山矿充填采矿法系统安全性层次结构,确定充填采矿法系统安全性评价指标模糊隶属度。
The gas is one of the most important factors which endanger the security of the mining production.
瓦斯是危害矿井安全生产的重要因素之一。
The gas is one of the most important factors which endanger the security of the mining production.
瓦斯是危害矿井安全生产的重要因素之一。
应用推荐