Suggested Topics within your search.
Suggested Topics within your search.
-
61
A Cleaner Mining Method for Waste Tailings as Paste Materials to Goafs
Published 2020-01-01“…Underground mining is the primary method to obtain economically valuable minerals, but it usually brings a large number of goafs (mined-out voids) and large quantities of waste tailings. …”
Get full text
Article -
62
An edge awareness-enhanced visual SLAM method for underground coal mines
Published 2025-03-01“…Research on visual SLAM methods tailored for feature degradation scenes in underground coal mines holds great significance for advancing the roboticization of mobile equipment used in coal mines.…”
Get full text
Article -
63
Application and validation of the surface-to-underground transient electromagnetic method for detecting deep water-rich area affected by shallow aquifers: a case study of the Ningdong mining area
Published 2025-04-01“…Therefore, SUTEM can serve as a method for the detection of deep water-rich area in coal mines under similar geological conditions.…”
Get full text
Article -
64
Automatic Detection and Calculation of Mining Subsidence in Large-Scale Interferograms With Transformer-CNN Model
Published 2025-01-01“…Validation experiments utilizing Sentinel-1, ALOS-2, and LT-1 satellite data demonstrated that: 1) RAUNet enables precise detection of subsidence zones followed by calculation applied exclusively to the interferogram tiles within those zones, significantly improving data-processing efficiency and more intuitively revealing surface deformation in mining areas; 2) RAUNet can adapt to the differences between C-band and L-band data, yielding superior accuracy compared with traditional methods across multiple interferometric pairs. …”
Get full text
Article -
65
Domain Knowledge-Enhanced Process Mining for Anomaly Detection in Commercial Bank Business Processes
Published 2025-07-01“…The empirical results demonstrate that the E-Heuristic Miner significantly outperforms traditional machine learning methods and process mining algorithms in process anomaly detection. …”
Get full text
Article -
66
Thyroid nodule detection and influencing factors in male coal mine workers in Shanxi Province
Published 2025-05-01“…The prevalence of this disease needs to be taken seriously and targeted measures should be taken to address its influencing factors.ObjectiveTo analyze the detection and influencing factors of thyroid nodules among adult male workers in coal mining enterprises in Shanxi Province, and provide a theoretical basis for the prevention of thyroid nodules.MethodsA total of 5195 adult male workers from coal mining enterprises who ordered physical examination provided by the Xishan Coal Electricity (Group) Corporation Occupational Disease Prevention and Control Institute in Taiyuan City, Shanxi Province from May 2023 to December 2023 were selected as research subjects. …”
Get full text
Article -
67
Detection and Theoretical Numerical Simulation of the Failure Depth of the Bottom Plate in Belt Pressure Mining
Published 2024-01-01“…By using “ultrasonic detection method + stress monitoring inverse analysis method,” the measured data such as disturbance failure depth and distribution law of large mining width working face were obtained. …”
Get full text
Article -
68
Research on the detection of obstacles in front of unmanned vehicles in opencast mines based on binocular vision
Published 2024-12-01“…Aiming at the current stage of obstacle detection in open pit mines, most of which are in the two-dimensional stage, and can only recognize the target obstacles, but lack of measurement of the depth information of the obstacles, and can not make a correct decision on the obstacles in front of them; this paper is based on the binocular camera, and provides the support of the depth data of the obstacles in front of the unmanned vehicle by the method of binocular vision depth detection. …”
Get full text
Article -
69
Flood Detection in Complex Surface Mining Areas Using Satellite Data for Sustainable Management
Published 2023-10-01“…In this research, the change detection method is applied using Synthetic Aperture Radar (SAR), and flood-prone zones are delineated.…”
Get full text
Article -
70
Text Mining and Unsupervised Deep Learning for Intrusion Detection in Smart-Grid Communication Networks
Published 2025-03-01“…This work proposes an anomaly detection method for high-dimensional sequences based on a bidirectional LSTM autoencoder. …”
Get full text
Article -
71
Application of Electrical Resistivity Tomography (ERT) in Detecting Abandoned Mining Tunnels Along Expressway
Published 2025-02-01“…The findings not only serve as a reference for the subsequent remediation of the goaf area but also offer new insights into the detection of abandoned mining tunnels.…”
Get full text
Article -
72
Enhancing Object Detection in Underground Mines: UCM-Net and Self-Supervised Pre-Training
Published 2025-03-01“…Building upon this foundation, we propose UCM-Net, a detection model based on the YOLO architecture. Furthermore, a self-supervised pre-training method is introduced to generate mine-specific pre-trained weights, providing the model with more semantic features. …”
Get full text
Article -
73
Fine detection of floor water damage by three-dimensional direct current electric method based on cross-lane observation
Published 2025-06-01“…Mine direct current electric method has become one of the main means of water disaster detection in the floor of working face because of its high sensitivity and strong anti-interference ability in detecting low resistance. …”
Get full text
Article -
74
Hard Example Mining Method for Visual Perception Based on Multi-sensor Fusion
Published 2021-11-01“…Experiments show that hard samples in the mining autopilot scenes can be effectively collected by this method, and be used to improve the performance of object detection through incremental transfer learning signi ficantly. …”
Get full text
Article -
75
Mining behavior pattern of mobile malware with convolutional neural network
Published 2020-12-01“…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
Get full text
Article -
76
An Innovative Analysis of Time Series-Based Detection Models for Improved Cancer Detection in Modern Healthcare Environments
Published 2023-12-01“…Technological advances have enabled researchers to develop more precise and reliable methods of cancer detection that go beyond traditional methods, such as biopsy and imaging. …”
Get full text
Article -
77
-
78
Data Mining in Elite Beach Volleyball – Detecting Tactical Patterns Using Market Basket Analysis
Published 2019-09-01Get full text
Article -
79
Lightweight blasthole image detection and positioning method
Published 2025-03-01Get full text
Article -
80
Three-component detection technology of down-hole TEM for hidden geological anomalies in coal mines
Published 2025-01-01“…Both theoretical models and experimental data show that the borehole transient electromagnetic three-component anomaly localization technique is an effective method for detecting geological anomalies around boreholes in coal mines.…”
Get full text
Article