A general method for the synthesis of oxazolines and oxazoles was developed through I2-catalyzed C-O bond formation and dehydrogenation with the same oxidant, TBHP. By simply tuning reaction bases, either oxazolines or oxazoles were selectively produced from β-acylamino ketones.
Stress concentration in partially caved goaf is the main cause of dynamic pressure accident in the lower seam mining. Aimed at the characteristics of caving in shallow partially caved goaf (PCG) and the specificity of interior load‐bearing structures, a classification criterion of goaf caving was proposed. The characteristics of cooperative load‐bearing in pillar group and gob pile were revealed by numerical calculation, physical simulation, and theoretical analysis. Taking intermittent mining as an example, combined with the deformation behaviors of the main roof and the loading characteristics of waster rock mass, the characteristics of the load‐bearing of gob piles were described in the form of a piecewise function. A FLAC3D model of intermittent mining is modeled to evaluate the stability of pillars, the long‐term stability and distribution laws of overlying loads were revealed through a refined model. The results show that the width of the caved zone bearing the load in the intermittent goaf is about 20 m, and the maximum load‐bearing capacity is 1.055 MPa. The maximum depth of the plastic region in one side of the pillar is 1.48 m, and the load on elastic zone is about 11.33 MPa. This study provides a method for the study of the caving characteristics and load uncertainty in PCG, and the results provide important theoretical values for the safe mining of lower coal seams.
In longwall top coal caving (LTCC), the resource recovery ratio of the working face is directly determined by the top coal recovery ratio. An investigation of the evolution of top coal drawing characteristics and revealing the evolution of top coal drawing parameters is necessary when providing guidance for caving parameter selection and improving the top coal recovery ratio. Based on in-situ measurements of the size distribution of caved top coal blocks in Wangjialing coal mine, a finite difference method (FDM)–discrete element method (DEM) coupled method was applied to establish a “continuous–discontinuous” numerical model and the process from the first coal drawing to the common coal drawing was simulated with 17 separate working face advances. The evolution of the drawing body (DB), loose body (LB), and top coal boundary (TCB) was obtained. The results show that, the evolution of parameters of DB such as shape and size, drawing amount, length and deflection angle of the long axis of the profile ellipsoid tended to decrease first, then increase, decrease again, and finally stabilise; the increment of the LB advance coal wall distance and the coal pillar distance was close to 0 m in the common coal drawing stage, while width increment of the LB was close to the drawing interval (0.865 m). The TCB formed after each coal drawing round was fitted based on the improved “Hook” function. The evolution of height and radius of curvature of TCB’s stagnation point was analysed. This was divided into three stages: the first (first to third drawing rounds) was the initial mining influence stage, the second (fourth to ninth drawing rounds) was the transitional caving stage, and the third (after tenth drawing round) was the common coal drawing stage.
SPECK is a family of lightweight block ciphers published by the U.S. National Security Agency in 2013. The SPECK family consists of 10 versions, supporting a wide range of block and key sizes. Recently H. Tupsamudre et al. gave an approach to recovering the last round key of SPECK family with n/3 fault injections, where 2n is the block size. In this paper, we present two improved differential fault attacks on the SPECK family under different fault models. The first attack assumes a more practical random fault model and recovers the last round key with about 5 ∼ 8 fault injections on all versions with different block sizes, which is far less than that of H. Tupsamudre et al.'s attack. The second attack only requires 4 specific faults to recover the last round key (except the most significant bit) over an arbitrary block size under a chosenvalue fault model.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.