Showing 61 - 80 results of 1,037 for search 'mining methods detection', query time: 0.18s Refine Results
  1. 61

    A Cleaner Mining Method for Waste Tailings as Paste Materials to Goafs by Yuxi Liu, Zhixiang Liu, Keming Li, Sijia Deng, Longjun Dong

    Published 2020-01-01
    “…Underground mining is the primary method to obtain economically valuable minerals, but it usually brings a large number of goafs (mined-out voids) and large quantities of waste tailings. …”
    Get full text
    Article
  2. 62

    An edge awareness-enhanced visual SLAM method for underground coal mines by Qi MU, Xin LIANG, Yuanjie GUO, Yuhao WANG, Zhanli LI

    Published 2025-03-01
    “…Research on visual SLAM methods tailored for feature degradation scenes in underground coal mines holds great significance for advancing the roboticization of mobile equipment used in coal mines.…”
    Get full text
    Article
  3. 63

    Application and validation of the surface-to-underground transient electromagnetic method for detecting deep water-rich area affected by shallow aquifers: a case study of the Ningdong mining area by Maofei Li, Zhonghao Dou, Zhihai Jiang, Juan Yu, Luping Xiao

    Published 2025-04-01
    “…Therefore, SUTEM can serve as a method for the detection of deep water-rich area in coal mines under similar geological conditions.…”
    Get full text
    Article
  4. 64

    Automatic Detection and Calculation of Mining Subsidence in Large-Scale Interferograms With Transformer-CNN Model by Hongdong Fan, Jialin Xin, Tao Lin, Jun Wang

    Published 2025-01-01
    “…Validation experiments utilizing Sentinel-1, ALOS-2, and LT-1 satellite data demonstrated that: 1) RAUNet enables precise detection of subsidence zones followed by calculation applied exclusively to the interferogram tiles within those zones, significantly improving data-processing efficiency and more intuitively revealing surface deformation in mining areas; 2) RAUNet can adapt to the differences between C-band and L-band data, yielding superior accuracy compared with traditional methods across multiple interferometric pairs. …”
    Get full text
    Article
  5. 65

    Domain Knowledge-Enhanced Process Mining for Anomaly Detection in Commercial Bank Business Processes by Yanying Li, Zaiwen Ni, Binqing Xiao

    Published 2025-07-01
    “…The empirical results demonstrate that the E-Heuristic Miner significantly outperforms traditional machine learning methods and process mining algorithms in process anomaly detection. …”
    Get full text
    Article
  6. 66

    Thyroid nodule detection and influencing factors in male coal mine workers in Shanxi Province by Mengtian XIONG, Yingjun CHEN, Yingtong CHEN, Zeyuan ZHANG, Qiang LI, Gaisheng LIU, Liuquan JIANG, Qingsong CHEN

    Published 2025-05-01
    “…The prevalence of this disease needs to be taken seriously and targeted measures should be taken to address its influencing factors.ObjectiveTo analyze the detection and influencing factors of thyroid nodules among adult male workers in coal mining enterprises in Shanxi Province, and provide a theoretical basis for the prevention of thyroid nodules.MethodsA total of 5195 adult male workers from coal mining enterprises who ordered physical examination provided by the Xishan Coal Electricity (Group) Corporation Occupational Disease Prevention and Control Institute in Taiyuan City, Shanxi Province from May 2023 to December 2023 were selected as research subjects. …”
    Get full text
    Article
  7. 67

    Detection and Theoretical Numerical Simulation of the Failure Depth of the Bottom Plate in Belt Pressure Mining by Xipeng Cui, Shuancheng Gu, Jinhua Li, Jiahao Wen, Kailei Zhao, Xinlei Liu

    Published 2024-01-01
    “…By using “ultrasonic detection method + stress monitoring inverse analysis method,” the measured data such as disturbance failure depth and distribution law of large mining width working face were obtained. …”
    Get full text
    Article
  8. 68

    Research on the detection of obstacles in front of unmanned vehicles in opencast mines based on binocular vision by Shunling RUAN, Huiguo ZHANG, Qinghua GU, Caiwu LU, Di LIU, Jing MAO

    Published 2024-12-01
    “…Aiming at the current stage of obstacle detection in open pit mines, most of which are in the two-dimensional stage, and can only recognize the target obstacles, but lack of measurement of the depth information of the obstacles, and can not make a correct decision on the obstacles in front of them; this paper is based on the binocular camera, and provides the support of the depth data of the obstacles in front of the unmanned vehicle by the method of binocular vision depth detection. …”
    Get full text
    Article
  9. 69

    Flood Detection in Complex Surface Mining Areas Using Satellite Data for Sustainable Management by Konstantinos Karalidis, Georgios Louloudis, Christos Roumpos, Eleni Mertiri, Francis Pavloudakis

    Published 2023-10-01
    “…In this research, the change detection method is applied using Synthetic Aperture Radar (SAR), and flood-prone zones are delineated.…”
    Get full text
    Article
  10. 70

    Text Mining and Unsupervised Deep Learning for Intrusion Detection in Smart-Grid Communication Networks by Joseph Azar, Mohammed Al Saleh, Raphaël Couturier, Hassan Noura

    Published 2025-03-01
    “…This work proposes an anomaly detection method for high-dimensional sequences based on a bidirectional LSTM autoencoder. …”
    Get full text
    Article
  11. 71

    Application of Electrical Resistivity Tomography (ERT) in Detecting Abandoned Mining Tunnels Along Expressway by Mengyu Sun, Jian Ou, Tongsheng Li, Chuanghua Cao, Rong Liu

    Published 2025-02-01
    “…The findings not only serve as a reference for the subsequent remediation of the goaf area but also offer new insights into the detection of abandoned mining tunnels.…”
    Get full text
    Article
  12. 72

    Enhancing Object Detection in Underground Mines: UCM-Net and Self-Supervised Pre-Training by Faguo Zhou, Junchao Zou, Rong Xue, Miao Yu, Xin Wang, Wenhui Xue, Shuyu Yao

    Published 2025-03-01
    “…Building upon this foundation, we propose UCM-Net, a detection model based on the YOLO architecture. Furthermore, a self-supervised pre-training method is introduced to generate mine-specific pre-trained weights, providing the model with more semantic features. …”
    Get full text
    Article
  13. 73

    Fine detection of floor water damage by three-dimensional direct current electric method based on cross-lane observation by Guanqun ZHOU, Hongda ZHAO, Weixin ZHANG, Xiaoping WU, Xikai LIANG, Zongtao WANG, Yafei WANG

    Published 2025-06-01
    “…Mine direct current electric method has become one of the main means of water disaster detection in the floor of working face because of its high sensitivity and strong anti-interference ability in detecting low resistance. …”
    Get full text
    Article
  14. 74

    Hard Example Mining Method for Visual Perception Based on Multi-sensor Fusion by Jun LIN, Wenbo PAN, Jun YOU, Yanghan XU

    Published 2021-11-01
    “…Experiments show that hard samples in the mining autopilot scenes can be effectively collected by this method, and be used to improve the performance of object detection through incremental transfer learning signi ficantly. …”
    Get full text
    Article
  15. 75

    Mining behavior pattern of mobile malware with convolutional neural network by Xin ZHANG, Weizhong QIANG, Yueming WU, Deqing ZOU, Hai JIN

    Published 2020-12-01
    “…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
    Get full text
    Article
  16. 76

    An Innovative Analysis of Time Series-Based Detection Models for Improved Cancer Detection in Modern Healthcare Environments by Uma Shankari Srinivasan, Venkat Pavithra, Kaliappan Sutha, Sridevi Ramachandiran, Nallathambi Indumathi

    Published 2023-12-01
    “…Technological advances have enabled researchers to develop more precise and reliable methods of cancer detection that go beyond traditional methods, such as biopsy and imaging. …”
    Get full text
    Article
  17. 77
  18. 78
  19. 79
  20. 80

    Three-component detection technology of down-hole TEM for hidden geological anomalies in coal mines by Xiaowei GAO

    Published 2025-01-01
    “…Both theoretical models and experimental data show that the borehole transient electromagnetic three-component anomaly localization technique is an effective method for detecting geological anomalies around boreholes in coal mines.…”
    Get full text
    Article