Suggested Topics within your search.
Suggested Topics within your search.
-
101
Parameter Optimisation of Support Vector Machine using Genetic Algorithm for Cyberbullying Detection
Published 2025-01-01Get full text
Article -
102
The interpretable machine learning model for depression associated with heavy metals via EMR mining method
Published 2025-03-01Get full text
Article -
103
Community Detection Framework Using Deep Learning in Social Media Analysis
Published 2024-12-01Get full text
Article -
104
abnormal data detection and learning their behavior by abnormality and satisficing theory
Published 2015-12-01“…Learning of abnormalities is a considerable challenge in data mining and knowledge discovery. Exceptional phenomena detect among huge records of the database which contains a large number of normal records and very few abnormal ones. …”
Get full text
Article -
105
-
106
-
107
Automated detection of hospital outbreaks: A systematic review of methods.
Published 2017-01-01“…<h4>Results</h4>Twenty-nine studies were included. The detection algorithms were grouped into 5 categories: simple thresholds (n = 6), statistical process control (n = 12), scan statistics (n = 6), traditional statistical models (n = 6), and data mining methods (n = 4). …”
Get full text
Article -
108
APPLICATION OF CLASSIFICATION BASED ASSOCIATION (CBA) FOR MONKEYPOX DISEASE DETECTION
Published 2025-01-01Get full text
Article -
109
Damage Detection Method for High-Strength Aramid Conveyor Belts
Published 2025-01-01“…Mining conveyor belts play a crucial role in the mining transportation system, and the detection of damage caused to them can affect productivity and safety. …”
Get full text
Article -
110
Utilizing a Transient Electromagnetic Inversion Method with Lateral Constraints in the Goaf of Xiaolong Coal Mine, Xinjiang
Published 2025-08-01“…The abandoned goaf resulting from coal resource integration in China poses a significant threat to coal mine safety. The transient electromagnetic method (TEM) has emerged as a crucial technology for detecting goafs in coal mines due to its adaptable equipment and efficient implementation. …”
Get full text
Article -
111
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
112
Current status and prospects of mining technology in metal mines
Published 2025-05-01“…This gap is particularly noticeable in ultra-deep mining, where practical experience is especially lacking. (2) Future mining technologies that require urgent attention can be categorized into four types based on their criticality and urgency: bottleneck technologies, foundational technologies, urgent technologies, and forward-looking technologies. (3) The current “bottleneck” technical challenges facing China’s mining sector include the development of intelligent and unmanned technologies for open-pit mining, advanced deep mining technologies for underground operations, and the research and application of specialized mining software. (4) The urgent technologies identified in this study include precise detection and safety management technologies for goaf areas, ultra-large-scale filling mining technologies for metallic mines, and intelligent ore grade detection technologies. (5) Foundational technologies encompass rock mechanics modeling for deep mining, multi-scale fracture simulation processes under geothermal system rock–hydraulic coupling, and dynamic control theories for managing disasters associated with deep mining activities. (6) Forward-looking technologies include a range of innovations, such as new transportation technologies for deep open-pit mines, advanced deep-well lifting techniques, novel efficient rock-breaking technologies, integrated mining and beneficiation technologies, co-extraction methods for both mineral and geothermal resources, and fluidized mining techniques for metallic minerals. …”
Get full text
Article -
113
Text mining of hypertension researches in the west Asia region: a 12-year trend analysis
Published 2024-12-01Get full text
Article -
114
Technical advances and research directions of borehole geophysical prospecting for coal mines
Published 2025-06-01“…BackgroundHigh-precision and long-distance exploration of geological conditions is required for coal extraction and disaster prevention in coal mines. However, traditional drilling and geophysical prospecting methods face technical bottlenecks such as insufficient exploration accuracy and limited exploration ranges. …”
Get full text
Article -
115
Multi-scale target intelligent detection method for coal, foreign object and early damage of conveyor belt surface under low illumination and dust fog
Published 2024-12-01“…The intelligent transportation system of coal mine needs to carry out integrated visual detection of foreign object such as gangue and belt damage. …”
Get full text
Article -
116
Multi-scale fusion network for coal mine drill rod counting based on directional object detection in complex scenes
Published 2025-09-01“…However, challenges such as dim lighting, small target sizes, diverse object perspectives, and complex visual interference in coal mine environments significantly limit the accuracy and real-time performance of existing object detection methods. …”
Get full text
Article -
117
Enhanced Ground Fissure Detection in Mining Areas Based on Visible–Infrared Image Fusion and YOLOv5
Published 2025-01-01“…This article proposes FisFusionYOLO, a novel method that integrates visible–infrared image fusion with a YOLOv5 deep learning network to enhance fissure detection accuracy and efficiency. …”
Get full text
Article -
118
Seq2Seq-based GRU autoencoder for anomaly detection and failure identification in coal mining hydraulic support systems
Published 2025-01-01“…However, the nonlinear, non-stationary characteristics and noise interference in hydraulic support pressure data pose significant challenges for anomaly detection and fault diagnosis. This study proposes an anomaly detection and failure identification method based on Gated Recurrent Unit Autoencoder (GRU-AE), aimed at achieving anomaly detection in hydraulic support pressure data and equipment failure early warning. …”
Get full text
Article -
119
-
120
Camera-Adaptive Foreign Object Detection for Coal Conveyor Belts
Published 2025-04-01“…We evaluate CAFOD on a dataset collected from real coal mines using three distinct cameras. Experimental results demonstrate that CAFOD outperforms State-of-the-Art object detection methods, achieving superior accuracy and robustness across varying camera perspectives.…”
Get full text
Article