Showing 361 - 380 results of 1,037 for search 'mining methods detection', query time: 0.20s Refine Results
  1. 361

    Learning by precedents based on the analysis of the features properties by V. V. Krasnoproshin, V. G. Rodchanka

    Published 2019-06-01
    “…A possibility to use this method for automatic detection and interpretation of hidden, previously unknown patterns in data mining tasks is presented.…”
    Get full text
    Article
  2. 362
  3. 363

    On the academic ideology of “Transport is traffic” by Hongwei MA, Qinghua MAO, Xusheng XUE, Chuanwei WANG, Peng WANG, Zhen NIE, Youyou DUAN, Junlei SIMA, Jianquan CHAI, Yanzhang CHEN

    Published 2025-07-01
    “…The coal flow detection model of each node of the coal mine continuous transportation system is established, the coal flow detection method of multi-information fusion is proposed, the coal flow database is constructed, the continuous transportation system is digitized, and the solid foundation of the intelligent continuous transportation system is laid. …”
    Get full text
    Article
  4. 364

    A synthetic segmentation dataset generator using a 3D modeling framework and raycaster: a mining industry application by Wilhelm Johannes Kilian, Jaco Prinsloo, Jan Vosloo, Stéphan Taljaard

    Published 2024-12-01
    “…Many industries utilize deep learning methods to increase efficiency and reduce costs. One of these methods, image segmentation, is used for object detection and recognition in localization and mapping. …”
    Get full text
    Article
  5. 365
  6. 366

    A Two-Level Rule-Mining Approach to Classify Breast Cancer Patterns Using Adaptive Directed Mutation and Genetic Algorithm by Hui-Ching Wu, Ming-Hseng Tseng

    Published 2025-07-01
    “…The classification technique introduced in this study facilitates the discovery of breast cancer patterns by integrating a real-coded genetic algorithm, an adaptive directed mutation operator, and a two-level malignant-rule-mining process. The experimental results, compared with existing rule-based methods from previous studies, demonstrate that the proposed approach generates simple and interpretable decision rules and effectively identifies patterns that lead to accurate breast cancer classification.…”
    Get full text
    Article
  7. 367

    Linguistic Summarization and Outlier Detection of Blended Learning Data by Pham Dinh Phong, Pham Thi Lan, Tran Xuan Thanh

    Published 2025-06-01
    “…Those extracted linguistic summaries in the form of sentences in natural language are easy to understand for humans. Furthermore, a method of detecting the exceptional cases or outliers of the learning courses based on linguistic summaries expressing common rules in different scenarios is also proposed. …”
    Get full text
    Article
  8. 368

    Change and Pollution Evaluation of Groundwater from Wet and Dry Periods of Ion-adsorbed Rare Earth Mine in Northern Guangdong Province by Yuan Pingwang, Wang Yi, Wang Lidong, He Peiyong

    Published 2022-04-01
    “…[Methods] Ten sets of groundwater samples were collected from an ion-adsorbed rare earth mine in Northern Guangdong Province during both the wet season and the dry season. …”
    Get full text
    Article
  9. 369

    Application of Spread-Spectrum Induced Polarization (SSIP) Technology in W-Sn Mineral Exploration (Xitian Mining District, SE China) by Xiaoqiang Li, Haifei Liu, Yingjie Zhao, Yuhao Zhang, Daowei Zhu

    Published 2025-06-01
    “…As strategic critical metals, tungsten (W) and tin (Sn) require efficient exploration methods for effective resource development. This study implemented an advanced spread-spectrum induced polarization (SSIP) method in the Xitian mining district of southern China. …”
    Get full text
    Article
  10. 370

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  11. 371

    Hybrid metaheuristic optimization for detecting and diagnosing noncommunicable diseases by Saleem Malik, S. Gopal Krishna Patro, Chandrakanta Mahanty, Saravanapriya Kumar, Ayodele Lasisi, Quadri Noorulhasan Naveed, Anjanabhargavi Kulkarni, Abdulrajak Buradi, Addisu Frinjo Emma, Naoufel Kraiem

    Published 2025-03-01
    “…Abstract In our data-driven world, the healthcare sector faces significant challenges in the early detection and management of Non-Communicable Diseases (NCDs). …”
    Get full text
    Article
  12. 372
  13. 373

    Exploration of the biodiversity and mining novel target genes of Listeria monocytogenes strains isolated from beef through comparative genomics analysis by Bo Zhang, Wenjie Sun, Xiaoxu Wang, Honglin Ren, Yang Wang, Shaohui Hu, Chengwei Li, Yuzhu Wang, Jiaqi Hou, Xueyu Hu, Ruoran Shi, Yansong Li, Shiying Lu, Qiang Lu, Zengshan Liu, Pan Hu

    Published 2025-04-01
    “…A total of 416 potential target genes were identified through pan-genomic screening, which were then further filtered using a hub gene selection method to mining novel target genes. Ultimately, 10 highly connected hub genes were selected: bglF_2, tilS, group_2105, group_2431, oleD, ndk, flgG, purB, pbpB, and fni. …”
    Get full text
    Article
  14. 374

    Detection of Rock Mass Defects Using Seismic Tomography by Zheng Jian, Guoyan Zhao, Ju Ma, Leilei Liu, Weizhang Liang, Shuang Wu

    Published 2025-01-01
    “…Furthermore, to assess the practical efficacy of this physical detection method, the wave velocity tomography technology was used to detect hidden goafs within a tantalum–niobium mine belonging to the Hunan Fuguihengtong Mining Company. …”
    Get full text
    Article
  15. 375

    Application of Data Mining Technology on Surveillance Report Data of HIV/AIDS High-Risk Group in Urumqi from 2009 to 2015 by Dandan Tang, Man Zhang, Jiabo Xu, Xueliang Zhang, Fang Yang, Huling Li, Li Feng, Kai Wang, Yujian Zheng

    Published 2018-01-01
    “…Method. The data from the sentinel monitoring data of the three groups of high-risk groups (injecting drug users (IDU), men who have sex with men (MSM), and female sex workers (FSW)) in Urumqi from 2009 to 2015 included demographic characteristics, sex behavior, and serological detection results. …”
    Get full text
    Article
  16. 376

    Research status of community detection based on local expansion by Yancui SHI, Yuan WANG, Qing ZHAO, Xiankun ZHANG

    Published 2019-01-01
    “…Community detection can effectively mine the characteristics of the network as well as the hidden information.Local expansion is a commonly used method of community detection,and it can be divided into two steps:the selection of seeds and the local expansion.Therefore,in order to analyze the advantages and disadvantages of the existing methods and their application,these methods about the selection of seeds,local expansion and evaluation were summarized,compared and analyzed.Then,the application and the research difficulties of community detection based on local extension were summarized.Finally,the research directions of community detection based on local expansion were given.…”
    Get full text
    Article
  17. 377
  18. 378
  19. 379

    Analysis of Illegal Gold Mining (PETI) Impact on The Environment with TDS, TSS, Mercury and Cyanide Parameters in Water and Sediment of Cikaniki River by Awang Silvan Erusani, Nurmaya Arofah*, Sofatunida Sofatunida, Talitha Hasna Fauzi, Muhammad Andi Jabbar

    Published 2025-07-01
    “…Gold production from artisanal mining extraction reaches 120 tons annually, providing significant environmental and economic impacts for the community. …”
    Get full text
    Article
  20. 380

    Data mining-based screening of prevalent mixture systems in aquatic environments: A case study of antibiotics in the Yangtze River Basin by Ting-Ting Ding, Shi-Lin Du, Hong-Yi Liang, Ya-Hui Zhang, Yong Tao, Ming-Xiao Li, Jin Zhang, Shu-Shen Liu

    Published 2025-09-01
    “…This study applied frequent itemset mining, a technique traditionally used in market basket analysis, to develop a prevalent mixture system screening (PMSS) method for identifying combinations that frequently co-occur in the environment. …”
    Get full text
    Article