Science topic

Mining - Science topic

Explore the latest publications in Mining, and find Mining experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Mining (10,000)
Sorted by most recent
Article
Full-text available
Vehicle tracking detection, recognition and counting is an important part of vehicle analysis. Design�ing such a model with excellent performance is difficult. The traditional target detection algorithm based on artificial features has poor generalization ability and robustness. In order to take use the deep learning method for vehicle tracking det...
Article
Full-text available
The key to successful product development is better understanding of customer requirements and efficiently identifying the product attributes. In recent years, a growing number of researchers have studied the mining of customer requirements and preferences from online reviews. However, since customer requirements often change dynamically on multi-g...
Article
Full-text available
Fibrous-type filters are used to capture dust particles in mining and other occupations where personnel are exposed for prolonged periods. Dust cleansing devices including flooded-bed dust scrubbers use these mesh-type multi-layered filters. These filters trap dust particles efficiently on their surface and inside their mesh. However, their continu...
Article
Full-text available
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetration test and compensate for defense deficiency. However, most TTP intelligence is described in unstructured threat data, such as APT analysi...
Article
Full-text available
A relevant fraction of human interactions occurs on online social networks. In this context, the freshness of content plays an important role, with content popularity rapidly vanishing over time. We therefore investigate how influencers’ generated content (i.e., posts) attracts interactions, measured by the number of likes or reactions. We analyse...
Article
Full-text available
How can we detect and analyze hyperlink-driven misbehavior in online forums? Online forums contain enormous amounts of user-generated contents, with threads and comments frequently supplemented by hyperlinks. These hyperlinks are often posted with malicious intention and we refer to this as ‘hyperlink-driven misbehavior.’ We present HyperMan, a sys...
Article
Full-text available
Background The current soil environmental assessment system is inadequate in terms of the spatiotemporal distribution of heavy metal pollutants. This study employed the numerical simulation technique to predict spatiotemporal distribution patterns of heavy metals within 50 days and to assess the soil risk characteristics of heavy metal pollution ne...
Article
Full-text available
This study aims to reduce the misinterpretation and conceptual ambiguity of slow tourism and find the gaps between theory and practice. Multiple videos on a famous video-sharing platform are analyzed to comprehend travel broadcasters' perceptions and experiences. Textual mining with Leximancer is applied, and the findings are threefold. First, this...
Article
Full-text available
Program synthesis is the task of automatically generating programs from user intent, which is one of the central problems in automated software engineering. Recently many researchers use a neural network to learn the distribution over programs based on user intent (such as API and type name), known as neural program synthesis (NPS). The generated p...
Conference Paper
Full-text available
How social media platforms could fairly conduct content moderation is gaining attention from society at large. Researchers from HCI and CSCW have investigated whether certain factors could affect how users perceive moderation decisions as fair or unfair. However, little attention has been paid to unpacking or elaborating on the formation processes...
Article
Full-text available
Bunch-holes blasting (several blastholes arranged in a bunch with short spacing and detonated simultaneously to form a large common blasting crater) is typically used in underground mines to increase blasting efficiency under a single free surface. Considering the low accuracy of pyrotechnic detonators, which are commonly used in Chinese mines, bun...
Article
Full-text available
Rockburst has become one of the most frequent dynamic disasters in coal mines when mining activities proceed towards greater depths. The goaf near the working face is the dominant factor, resulting in a high risk of rockburst and seriously threatening the safe production of coal mines. In this paper, to systematically analyze the stress and energy...
Article
Full-text available
The information retrieval system is a set of resources and tools that allow users to search for information in a given domain. This system permits users to perform their research according to their objectives in diverse ways producing different behaviors. Even users with the same objective may follow different paths and stand different sub-processe...
Article
Full-text available
We prove an abstract form of the strong convergence of the Halpern-type and Tikhonov-type proximal point algorithms in CAT(0) spaces. In addition, we derive uniform and computable rates of metastability (in the sense of Tao) for these iterations using proof mining techniques.
Article
Full-text available
Karstification can effect on the stability of rock slopes (both natural and manmade) by creating solution cavities and expanding joints within the rocks. The present research studied the effects of karstification on the stability of slopes of the pit mine wall of the Sadat Sirize iron mine. In this regard, a comprehensive field observation was carr...
Article
Full-text available
Software companies commonly develop and maintain variants of systems, with different feature combinations for different customers. Thus, they must cope with variability in space. Software companies further must cope with variability in time, when updating system variants by revising existing software features. Inevitably, variants evolve orthogonal...
Article
Full-text available
Subterranean aquatic biodiversity loss has exceeded that of surface aquatic systems, and cavefish are a predominant indicator of biodiversity loss. The karst subsurface environment and its biodiversity are generally considered to be fragile and extremely sensitive to environmental disturbances such as hydroelectric projects. Subterranean biodiversi...
Article
Full-text available
One of the dilemmas faced by forecasting is that the data are collected at different frequencies in some practical applications. This paper treats mixed frequency data as a special kind of multi-source data, that is, data from each source is collected at a different sampling frequency. Based on this cognition, this paper draws on the idea of neural...
Article
Full-text available
Underground mine production scheduling determines when, if ever, activities associated with the extraction of ore should be executed. The accumulation of heat in the mine where operators are working is a major concern. At the time of this writing, production scheduling and ventilation decisions are not made in concert. Correspondingly, heat limitat...
Article
Full-text available
Plain Language Summary In recent years, deep learning has greatly contributed to the field of meteorology and we perform an investigation into the use of convolutional neural networks (CNNs) to classify typical weather systems without manual labels. Although CNNs have produced remarkable results in image classification, few works have evaluated the...
Article
Full-text available
Augmented reality (AR) is, relatively, one of the newest techniques in visualization technologies, which began to be developed in the 1990s. AR can be expressed as positioning models in natural life environments by taking them out of the computer. A well-known and common approach is modeling in the computer environment and making applications. Ther...
Article
Full-text available
This paper simulates the block generation process of the mining pool in blockchain system based on the Proof of Work (PoW) consensus protocol, and mainly studies the three issues of block generation time, energy consumption of the mining pool and the number of transactions in the pending transaction pool. The mining pool is abstracted as a queueing...
Article
Full-text available
Sensitivity analysis provides information to understand response models and helps make better decisions in many fields, including the petroleum and mining industries. A new approximate method for sensitivity analysis through extracting covariogram ranges is proposed in this paper. In this method, the covariogram range will be treated the same as th...
Article
Full-text available
Heat transfer in shallow mine inlets is affected by several factors. These include, among others, the surface climate, the cyclic variability of ground temperature in the top 20–25 m of ground, and virgin rock temperature. The conventional climate simulation models cannot be readily applicable due to cyclic variations and the resultant thermal flyw...
Conference Paper
Full-text available
Visible Light Communications (VLC) have generated great interest in the scientific community in the last five years due to their great adaptation to harsh environments. Among the scenarios that can benefit from the advantages ofvVLC systems are Underground Mining (UM) tunnels. However,vthe physical phenomena and the irregularity of this environment...
Article
Full-text available
This research aims to determine the influence and significance of the factors that affect the company's performance. This Research used the variables of Supply Chain Management, Risk Management, Competitive Advantage and Corporate Performance which is used primary data from the distribution of online questionnaires. This research used in were 200 r...
Preprint
Full-text available
The core of many cryptocurrencies is the decentralised validation network operating on proof-of-work technology. In these systems, validation is done by so-called miners who can digitally sign blocks once they solve a computationally-hard problem. Conventional wisdom generally considers this protocol as secure and stable as miners are incentivised...
Article
Full-text available
Este artigo tem por objetivo fornecer um entendimento histórico acerca da biologia de sistemas, da mineração de texto, da curadoria manual, das redes biológicas, e, principalmente, das redes de interação proteína-proteína (redes PPIs). Ademais, este trabalho ainda busca traçar algumas bases para o desenvolvimento da construção das redes PPIs em div...
Article
Full-text available
Artificial Intelligence provide effective solution to many real time problems and challenges in the world. Real Time Analysis of rocks and structures is one of such challenges. Many situations require gaining the knowledge of rocks or building or iceberg structures. Examples where such analysis required are mining, rescue operations, sailing of shi...
Article
Full-text available
The association of radiation with matter, being it from external means (i.e. external sources) or from internal pollution of the body by toxic substances, can pose biological hazard which may show the clinical symptoms later. The nature and extent of these symptoms and the time they take to appear are a function of the amount of radiation absorbed...
Article
Full-text available
This paper presents a water inrush evaluation model based on the theory of floor water resisting key strata. The mechanical model of the water resisting key strata was constructed by the thin plate theory. The Mohr-Coulomb strength criterion was adopted to construct the water inrush risk index (WIRI) model. Taking the Yangcheng coal mine as the res...
Preprint
Full-text available
It is often assumed that healthy people have the genuine ability to maintain tight blood glucose regulation. However, a few recent studies revealed that glucose dysregulation such as hyperglycemia may occur even in people who are considered normoglycemic by standard measures and were more prevalent than initially thought, suggesting that more inves...
Article
Full-text available
In today's electronic world vast amounts of knowledge is stored within many datasets and databases. the default format of this data means that the knowledge within is not immediately accessible, but rather has to be mined and extracted. This requires some automated tools and they need to be effective and efficient way to extract. Association rule m...
Poster
Full-text available
Variations in sediment flux and grainsize distribution impact the flood risk. This is particularly the case where channels are fed by high mountain catchments. In this study, we investigate how these factors affect river morphology and flood inundation in the Nakkhu River in the Kathmandu basin. This is motivated by an awareness of upstream mining...
Article
Full-text available
The stress distribution and deformation of roadway surrounding rock at different pillar widths are investigated through theoretical calculation, numerical simulation and field monitoring, taking into account goaf compaction. The purpose is to determine the best width and the stress evolution of the reserved roadway protective coal pillar in fully m...
Article
Full-text available
The paper builds from the controversial approval of a large scale open-pit mine in the Lower Zambezi National Park of Zambia. The paper argues that such controversial approvals are themselves a reflection of subjectivity in the logic of EIA rules. Without amending, if not repealing these rules, subjectivity remains at the center of the approval sys...
Article
Full-text available
With the continuous improvement of mining technology and equipment in China’s coal mines, the number of working faces with high-intensity mining is increasing, and the area of surface damage continues to increase compared with previous years. In order to ensure safe production and protect the overall environment of the mining area, the damage chara...
Article
Full-text available
The first issue of Artificial Intelligence and Law journal was published in 1992. This paper provides commentaries on nine significant papers drawn from the Journal’s second decade. Four of the papers relate to reasoning with legal cases, introducing contextual considerations, predicting outcomes on the basis of natural language descriptions of the...
Article
Full-text available
In northern Shaanxi province, the coal seam deposit conditions are generally characterized by large thickness and shallow depth of burial, the phenomenon of coal pillar sloughing is serious in the process of working face retrieval, which brings great potential danger to mine safety production. In this paper, by monitoring the stress and damage of t...
Article
Full-text available
Financial institutions face challenges of fraud due to an increased number of online transactions and sophisticated fraud techniques. Although fraud detection systems have been implemented to detect fraudulent transactions in online banking, many systems just use conventional rule-based approaches. Rule-based detection systems have a difficulty in...
Article
Full-text available
In clinical medicine, the segmentation of blood vessels in retinal images is essential for subsequent analysis in clinical diagnosis. However, retinal images are often noisy and their vascular structure is relatively tiny, which poses significant challenges for vessel segmentation. To improve the performance of vessel segmentation, an improved mode...
Article
Full-text available
Dagushan Iron Mine is a large-scale open-pit mine. In this mine, the belt conveyors residing in the rock slope are employed for ore haulage. However, after the − 210 m bench was excavated, many fractures occurred in one of the roadways placing the belt conveyors. In this paper, this engineering case was introduced in detail and the fracturing mecha...
Article
Full-text available
Cancer is a highly heterogeneous disease, which leads to the fact that even the same cancer can be further classified into different subtypes according to its pathology. With the multi-omics data widely used in cancer subtypes identification, effective feature selection is essential for accurately identifying cancer subtypes. However, the feature s...
Preprint
Full-text available
Sequential recommendation models are primarily optimized to distinguish positive samples from negative ones during training in which negative sampling serves as an essential component in learning the evolving user preferences through historical records. Except for randomly sampling negative samples from a uniformly distributed subset, many delicate...
Article
Full-text available
In view of the management of slopes in large mine dumps in semi-arid regions, this study explored different methods for controlling soil erosion and improving the microenvironment of the surface of such slopes. Focusing on microtopography modifications and vegetation measures on the slopes of a large mine dump in a semi-arid region, the soil erosio...
Article
Full-text available
La actual transición epidemiológica que atraviesa la humanidad se caracteriza por la (re)emergencia de agentes infecciosos en la población humana y/o enfermedades infecciosas que se creían controladas o limitadas a ciertas regiones geográficas (Santosa et al. 2014). Las causas de esta (re)emergencia abarcan cambios antrópicos de los ecosistemas (mi...
Conference Paper
Full-text available
The main Purpose of Web mining is to disclose the hidden information from the database. Due to the growth of data volume in an organization sectors like banking, marketing, telecommunication, manufacturing, and transportation etc, a different technique for deletion of repetitive data and conversion of data to more usable forms has been proposed und...
Article
Full-text available
An important part of information gathering is to find what peoples think. With the large and growing availability of opinion-rich resources like blogs, forums, e-commerce, social media websites, etc, have a huge collection of people's views on their websites. Users' opinions thoughts views reviews and experiences are valuable information used in th...
Article
Full-text available
Efficiently modeling spatial–temporal information in videos is crucial for action recognition. To achieve this goal, state-of-the-art methods typically employ the convolution operator and the dense interaction modules such as non-local blocks. However, these methods cannot accurately fit the diverse events in videos. On the one hand, the adopted co...
Preprint
Full-text available
Even though raw mass spectrometry data is information rich, the vast majority of the data is underutilized. The ability to interrogate these rich datasets is handicapped by the limited capability and flexibility of existing software. We introduce the Mass Spec Query Language (MassQL) that addresses these issues by enabling an expressive set of mass...
Conference Paper
Full-text available
Employees act as the business' bloodstream, whereby the performance of its employees determines the success and failure of a business. Hence, it is important to understand how to improve employee performance. This study examines how transformational leadership and organizational support influence employee performance. It focuses on the importance o...
Article
Full-text available
In this article, we develop a reduced basis method for efficiently solving the coupled Stokes/Darcy equations with parametric internal geometry. To accommodate possible changes in topology, we define the Stokes and Darcy domains implicitly via a phase-field indicator function. In our reduced order model, we approximate the parameter-dependent phase...
Preprint
Full-text available
Recent contrastive based 3D action representation learning has made great progress. However, the strict positive/negative constraint is yet to be relaxed and the use of non-self positive is yet to be explored. In this paper, a Contrastive Positive Mining (CPM) framework is proposed for unsupervised skeleton 3D action representation learning. The CP...
Article
Full-text available
The electrocatalytic reduction of carbon dioxide (CO 2 RR) into value-added fuels is a promising initiative to overcome the adverse effects of CO 2 on climate change. Most electrocatalysts studied, however, overlook the harmful mining practices used to extract these catalysts in pursuit of achieving high-performance. Repurposing scrap metals to use...
Conference Paper
Full-text available
Fingerprinting positioning aided by wireless technologies plays an important role in a variety of industrial applications, such as factory automation, warehouse automation, and underground mining, where guaranteeing a position prediction error smaller than a threshold value is necessary to meet certain functional requirements. In this paper, we fir...