首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
郭有平 《黑龙江科技信息》2011,(2):43+297-43,297
随着时代的发展、科学的进步及其不断的开采实践和理论研究,围岩工程控制理论取得了长足发展,巷道支护形式也随之发生了重大变化,支护理念由被动支护变为主动支护,巷道的支护已由传统的棚式支护向锚杆、锚索支护转变,支护手段由单一支护向联合支护发展,从而改善了巷道的支护状况。锚杆、锚索支护是当今各种地下工程的一种新型先进的支护形式。  相似文献   

2.
一些煤矿还采用大于MU15的砖支护,这类支护即为石材支护,也叫砌碹支护。它们都属于刚性支护材料,在压应力情况下使用。主要阐述了砌碹支护的适用条件、施工工艺、质量评定等问题。  相似文献   

3.
王和廷 《中国科技纵横》2010,(12):178-178,166
通过对东荣三矿切眼大断面留顶煤支护技术的研究,论述了高强锚杆支护系统支护机理分析;高强锚杆支护系统支护设计方法;综采工作面切眼锚杆支护实例应用;影响锚杆、锚索支护可靠性的主要因素分析等,通过论证采用高强锚杆、锚索支护系统进行大断面留顶煤支护技术是可行的,具有较高的经济效益。  相似文献   

4.
建筑深基坑在工程施工中占重要地位,而其支护其实有多种。联合支护主要是指锚、喷、网联合支护技术。联合支护技术在地下巷道的支护过程中已经有了很深入的研究,文章主要就联合支护在基坑支护的应用进行分析。  相似文献   

5.
本文主要阐述了地质条件复杂条件下的锚喷支护、锚网支护、锚网喷支护、锚网梁支护、锚网梁喷支护、锚杆桁架支护、锚注联合支护等几种支护结构方式。  相似文献   

6.
复杂地质条件下的巷道是一直是巷道支护的难点之一。岩层属性差,地应力高,使得开拓、准备巷道支护困难,开拓巷道服务年限长、巷道断面更大,支护等级更高,单一的支护方式难以控制。支护方式的选择及多种支护方式联合支护越来越被关注。  相似文献   

7.
锚杆支护是目前一些煤矿企业矿井巷道的一种常用支护形式,其存在着支护成本过大、支护可靠性不足、预应力过小等缺陷。本文介绍了锚杆支护的相关理论和适用条件,分析了影响锚杆支护效果的问题,并介绍了锚杆与锚索联合支护的相关技术。  相似文献   

8.
喷锚支护因其支护设计、施工中的可靠性、可行性和经济性,在现代的边坡支护中大量使用。依据喷锚支护的原理,对喷锚支护在边坡支护中的应用进行了研究,并将其应用于某工程,取得了良好的效果,为以后的边坡支护设计施工提供了指导。  相似文献   

9.
水平巷道支护主要有整体混凝土支护、锚杆支护、喷射混凝土支护等。喷射混凝土施工过程中须注意以下问题:降低回弹率及回弹物的利用,降低粉尘,围岩渗水处理。井筒支护主要有临时支护和永久支护等。  相似文献   

10.
通过分析滨海软土区地质共性特点和实际工程的典型特点,确定广东省湛江市滨海深基坑群支护设计在周边围护体、内部支撑体系等方面的选择.结合基坑群周边环境详细阐述了基坑群独立支护方案和合并支护方案在各分区段采取的支护方式及合理性说明,并进一步结合2种支护方案的支撑体系布置形式、施工顺序安排、支护工程量、施工便利且安全经济等因素确定了紧邻地块基坑群合并支护方案的优异性,这个支护方案选型过程为其他滨海地区类似的基坑支护工程提供了一定的借鉴和参考.  相似文献   

11.
Although commonly confused, the values inherent in copyright policy are different from those inherent in scholarly standards for proper accreditation of ideas. Piracy is the infringement of a copyright, and plagiarism is the failure to give credit. The increasing use of Web-based electron publication has created new contexts for both piracy and plagiarism. In so far as piracy and plagiarism are confused, we cannot appreciate how the Web has changed the importance of these very different types of wrongs. The present paper argues that Web-based publication lessens the importance of piracy, while it heightens the need for protections against plagiarism. Copyright policy protects the opportunity for publishers to make a profit from their investments. As the cost of publication decreases in the electronic media, we need fewer copyright protections. Plagiarism is the failure to abide by scholarly standards for citation of sources. These standards assure us that information can be verified and traced to its source. Since Web sources are often volatile and changing, it becomes increasingly difficult and important to have clear standards for verifying the source of all information.  相似文献   

12.
刘洪伟 《中国软科学》2007,(2):154-156,160
从某个角度看,技术供给方的技术保护,供求双方的技术差距和技术交易摩擦,以及技术本身的技术属性和技术管理过程存在的问题等,最终都直接表现或间接转化为技术学习过程中的技术价格、技术交易费用、人工机会成本、技术管理费用等。技术学习障碍的大小问题实际上也就是技术学习的成本高低问题.  相似文献   

13.
我国国有企业员工离职问题的博弈分析   总被引:2,自引:0,他引:2  
运用四个发展阶段的主观博弈概念性分析框架,分析了决定国有企业员工离职行为的各种动态影响因素。其分别是当企业内部环境和员工个人偏好发生动态变化时、企业加大员工的生活工作等各方面保健措施、针对具有离职倾向的员工采取的激励约束措施、员工面临着的离职后外部劳动力市场预期收益等因素。  相似文献   

14.
对于大型基础的施工,存在深基坑和大体积砼的技术问题,通过探索和实践,取得了一种简单有效的基坑支护模式,获得了大体积砼浇灌的成功经验.  相似文献   

15.
珠江三角洲数字图书馆联盟在数字资源整合、解决信息孤岛问题,以及在服务受众范围、提高资源利用率等问题上做了很多保障措施,虽然珠江三角洲数字图书馆联盟取得了很多成绩,但是仍然面临很多挑战。通过SWOT-AHP分析法把影响珠三角联盟的因素进行了矩阵分析,给予了改进措施以及未来发展应该注意的事项。总结珠江三角洲数字图书馆联盟建设成功经验,希望借此能对其他研究人员给予启示。  相似文献   

16.
鲍甬婵  高峰 《现代情报》2016,36(3):97-100
试用数据库的知识产权受法律保护, 保护模式包括版权法保护、合同法保护以及技术措施保护等。当前对试用数据库的知识产权保护方面存在诸多问题, 图书馆要采取适当的保护策略, 如发布版权公告、做好技术保护、监控并处理违规行为、加强版权教育培训以及到期及时清理等, 切实做好试用数据库的知识产权保护工作。  相似文献   

17.
《Research Policy》2022,51(5):104492
Platform capitalism has facilitated the widespread replacement of employment contracts with contracts for services. These offer significantly fewer social and employment protections for the independent contractors engaged. What does this mean for the future of national social and employment protection (SEPs) systems? We show how the question of platform workers’ employment status – and therefore access to SEPs – remain unresolved under UK law. Drawing on socio-legal theory, we demonstrate why digital labor platforms represent a challenge to existing modes of employment law and labor market regulation. In the absence of immediate legal ‘fixes’, some unions and firms are innovating new ‘privatized social protection systems’. A ‘Self-Employed Plus’ (SE+) agreement in the UK parcel courier sector developed between Hermes, a UK-based courier service, and the GMB union represents an important example of such attempts being made to bridge the current regulatory void. We critically analyze the agreement and draw lessons for platform governance theory. We demonstrate that privatized SE+ provisions potentially offer significant benefits for platforms by reducing regulatory oversight, boosting productivity, and enhancing managerial control over platform complementors. At the same time, while they risk undermining national SEP systems and degrading worker protections, they also offer a window of opportunity for trade unions to gain a foothold in the platform economy.  相似文献   

18.
Gary Pisano 《Research Policy》2006,35(8):1122-1130
This paper reviews the contribution of Teece's article [Teece, D., 1986. Profiting from technological innovation: implications for integration, collaboration, licensing and public policy. Research Policy 15, 285-305.]. It then re-examines the core concept of appropriability in the light of recent developments in the business environment. Whereas twenty years ago the appropriability regime of an industry was exogenous and given, today they are often the product of conscious strategies of firms. And as open source software and other industries show, advantageous appropriability regimes are not always “tight” or characterized by strong intellectual property protections. The strategies adopted by firms that have successfully profited from their innovative activities cast into new light old questions about the impact of intellectual property protection on the rate and direction of innovation.  相似文献   

19.
Information theorists often construe new Information and Communication Technologies (ICTs) as leveling mechanisms, regulating power relations at a distance by arming stakeholders with information and enhanced agency. Management theorists have claimed that transparency cultivates stakeholder trust, distinguishes a business from its competition, and attracts new clients, investors, and employees, making it key to future growth and prosperity. Synthesizing these claims, we encounter an increasingly common view: If corporations voluntarily adopted new ICTs in order to foster transparency, trust, and growth, while embracing the redistributions of power they bring about, both corporations and stakeholders would benefit. The common view is short-sighted, however. In order to realize mutual benefit, transparency can not be conceived merely as efficient or economical. The implementation and use of new ICTs will be morally unsatisfactory unless they stably protect stakeholders. Moreover, without such protections, transparency is unlikely to produce lasting trust and growth. More specifically, corporate disclosures ought to be guided by a theory of stakeholder rights to know about threats or risks to stakeholders’ basic interests. Such rights are necessary moral protections for stakeholders in any business environment. Respect for transparency rights is not simply value added to a corporation’s line of goods and services, but a condition of a corporation’s justifiable claim to create value rather than harm, wrong, or injustice in its dealings.  相似文献   

20.
Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue plays a vital part in locating and preventing threats from being realised. Moreover, such technology offers more than ordinary information protections as it erects ‘warrant-proof’ spaces, technological black boxes that no matter what some authority might deem as being legitimately searchable is protected to the extent that there are very limited or non-existent means of forcing oneself in. However, it will be argued here that not only is using such anonymising technology and its extra layer of protection people’s right, but that it is ethically mandatory. That is, due to the en masse surveillance—from both governments and corporations—coupled with people’s limited awareness and ability to comprehend such data collections, anonymising technology should be built into the fabric of cyberspace to provide a minimal set of protections over people’s information, and in doing so force the intelligence community to develop more targeted forms of data collection.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号