Results 21 to 30 of about 1,156,762 (339)
A Pattern for Iron Ore Mines Financing [PDF]
Acknowledging the lack of financial resources in the field of mining, researchers have found a solution in the use of new tools. Despite the existence of tools, the mining sector still lacks financial resources. Therefore, this research aims to provide a
Mehdi Ali Hosseini +3 more
doaj +1 more source
Pour une approche culturaliste du risque environnemental
After half a century of activity, the 250 French uranium mines closed in the 1990s. Currently, they are placed in a context of opposition to the nuclear energy model which was developed in response to the oil crisis.
Sophie Bretesché, Antoine Gherardi
doaj +1 more source
Seasonal Abundance; Damage; and Comparison of Different Heights, Orientations, and Directions of Yellow Sticky Traps for Sampling of \u3ci\u3eLiriomyza Trifolii\u3c/i\u3e (Diptera: Agromyzidae) in Cotton [PDF]
This study was done to determine the optimum height, orientation, and direction of yellow sticky traps for sampling of Liriomyza trifolii (Burgess) (Diptera: Agromyzidae) in cotton fields.
Gencsoylu, Ibrahim
core +2 more sources
Geospatial technology perspectives for mining vis-a-vis sustainable forest ecosystems
Forests, the backbone of biogeochemical cycles and life supporting systems, are under severe pressure due to varied anthropogenic activities. Mining activities are one among the major reasons for forest destruction questioning the survivability and ...
Goparaju Laxmi +2 more
doaj +1 more source
Web + Data Mining = Web Mining [PDF]
Dieser Beitrag gibt eine kurze Beschreibung, was unter dem Begriff Web Mining zu verstehen ist und wie Webdaten mit gangigen Data-Mining-Techniken kombiniert werden konnen, um das Web besser als Informationsquelle nutzbar zu machen. Des Weiteren wird ein Uberblick uber die gangigen Hauptachsen gegeben, entlang derer die meisten aktuellen Entwicklungen ...
openaire +1 more source
How Hidden Can Be Even More Hidden?
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech +2 more
core +1 more source
The accurate prediction of surface subsidence induced by coal mining is critical to safeguarding the environment and resources. However, the precision of current prediction models is often restricted by the lack of pertinent data or imprecise model ...
Fei Ma, Lichun Sui, Wei Lian
doaj +1 more source
Harnessing a crowd of Web users for data collection has recently become a wide-spread phenomenon. A key challenge is that the human knowledge forms an open world and it is thus difficult to know what kind of information we should be looking for. Classic databases have addressed this problem by data mining techniques that identify interesting data ...
Yael Amsterdamer +3 more
openaire +1 more source
Productive flows control in coal mines under the condition of diversification of production [PDF]
The objective of the work consists in methodical bases of concept development for control by productive flows in coal mines with the use of cost-effective mechanisms.
Demchenko, Yurii +11 more
core +1 more source
We introduce the problem of grammar mining, where patterns are context-free grammars, as a generalization of a large number of common pattern mining tasks, such as tree, sequence and itemset mining. The proposed system offers data miners the possibility to specify and explore pattern domains declaratively, in a way which is very similar to the ...
Nijssen, Siegfried +2 more
openaire +3 more sources

