[1]
Zhao Wen and Lin Yunmei: Network simulation of discontinuous rock masses. Journal of Northeastern University. Vol. 15 (1992), No. 2, pp.128-130.
Google Scholar
[2]
Wu Aiqing, Zhou Huoming and Ren Fang: Research on 3-d rock joint network simulation techniques and its application to TGP. Journal of Yangtze River Scientific Research Institute. Vol. 15 (1998), No. 6, pp.15-18.
Google Scholar
[3]
CHEN Jian-ping: 3-D network numerical modeling technique for random discontinuities of rock mass. Chinese Journal of Geotechnical Engineering. Vol. 23 (2001), No. 4, pp.197-402.
Google Scholar
[4]
Jia Hongbiao, Ma Shuzhi, Tang Huiming and Liu Yourong: Study on engineering application of 3-d modeling of rock discontinuity network. Chinese Journal of Rock Mechanics and Engineering. Vol. 21 (2002), No. 7, pp.976-979.
Google Scholar
[5]
ZUO Sansheng and NIE Dexin: Application of monte-carlo simulation to the study of shear strength of jointed rock masses. Journal of Engineering Geology. Vol. 10 Suppl. (2002), pp.443-447.
Google Scholar
[6]
WANG Shu-lin, CHEN Jian-ping and SHI Bin-fei: Verification for 3-d random discontinuities network model of rock mass. Advance In Earth Sciences. Vol. 19 Suppl. (2004), pp.402-406.
Google Scholar
[7]
LI Xinqiang, YANG Songqing and WANG Xiaogang: Generation and visualization technologies of three-dimensional network of rockmass stochastic structural plane. Chinese Journal of Rock Mechanics and Engineering. Vol. 26 (2007), No. 12, pp.2564-2569.
Google Scholar
[8]
JIA Chao, WANG Zhi-peng and ZHU Wei-shen: Program for joint network simulation and its application to dynamic response analysis of underground caverns. Rock and Soil Mechanics. Vol. 32 (2011), No. 9, pp.2867-2872.
Google Scholar
[9]
Jian-yong Li, Jian Xue, Jun Xiao and YingWang: Block theory on the complex combinations of free planes. Computers and Geotechnics, Vol. 40 (2012), pp.127-134.
DOI: 10.1016/j.compgeo.2011.10.006
Google Scholar
[10]
LI Jian-yong, XIAO Jun and WANG Ying: Simulation method of rock stability analysis based on block theory. Computer Engineering and Applications, Vol. 46 (2010), No. 21, pp.4-8.
Google Scholar