Blasting operations carried out at mining enterprises and in construction have a negative seismic impact on the production environment of enterprises and other protected objects. As the pit depth increases, the slope ...
详细信息
ISBN:
(数字)9798331516321
ISBN:
(纸本)9798331516338
Blasting operations carried out at mining enterprises and in construction have a negative seismic impact on the production environment of enterprises and other protected objects. As the pit depth increases, the slope angle of the ledges and sides increases, which increases the likelihood of collapses as a result of seismic impacts of blasting *** information system SIBGEO-AM - seismic monitoring of industrial explosions at mining enterprises, created by SIGI LLC, is described. The seismic monitoring system includes a network of seismic stations installed along the perimeter of the quarry excavation, and a computer program designed to automate the process of collecting, data processing, analyzing, presenting, viewing and storing seismic monitoring results. Examples of records of typical seismic impacts of industrial explosions are given. Algorithms of filtration, selection of events, calculation of seismic impact force in the epicenter of the explosion on the side of the quarry are shown.
Aiming at the requirement of the mobile robot for the human-robot coexisting environment to distinguish people from objects and accurately estimate pedestrian pose and speed information in the indoor environment, the ...
详细信息
The article considers the possibilities of integrating computer modeling into the process of the formation of probabilistic thinking in teaching mathematics students. We give an example of studying the features of hea...
The article considers the possibilities of integrating computer modeling into the process of the formation of probabilistic thinking in teaching mathematics students. We give an example of studying the features of heavy-tailed distributions in comparison with the properties of a normal distribution.
The Trans-Domain Sea-Air Robot (TSAR) design with trans-domain capabilities or converting a normal drone to hybrid technology. It is still a major challenge to achieve miniaturization and enhance the maneuverability a...
详细信息
As humans, we use our facial expressions to communicate our thoughts and feelings without saying a word. The recognition of these facial expressions can provide a better idea of people's thoughts or opinions. At p...
详细信息
This paper proposes a deep learning method to generate knitting instructions from fabric images, reversing the traditional process of manual pattern coding. The instructions are based on the five-layer structure deriv...
详细信息
ISBN:
(数字)9798331529505
ISBN:
(纸本)9798331529512
This paper proposes a deep learning method to generate knitting instructions from fabric images, reversing the traditional process of manual pattern coding. The instructions are based on the five-layer structure derived from knitting logic, consisting of a front label recognizable from the front real image and a complete label corresponding to the knitting programming. The approach is divided into two phases: the Generation Phase, where neural networks produce front label instructions, and the Inference Phase, where mesh-based logic expands these instructions into complete labels. We also introduce an optimized labeling method for Kaspar's dataset, improving the accuracy, scalability, and knittability of the generated instructions. This method simplifies the knitting process by automating instruction generation directly from fabric images.
This study defines a specialized game description language, CCGDL, and develops an automated gameplay generation system called Creative Game Machine based on CCGDL. The system facilitates automated gameplay generation...
详细信息
ISBN:
(数字)9798331529505
ISBN:
(纸本)9798331529512
This study defines a specialized game description language, CCGDL, and develops an automated gameplay generation system called Creative Game Machine based on CCGDL. The system facilitates automated gameplay generation and quality evaluation by employing techniques like parent selection and rule crossover, ensuring controllable gameplay quality. Additionally, the study introduces a quantitative analysis method for gameplay quality, utilizing machine learning algorithms to predict gameplay quality. The system significantly reduces design cycles and development costs, demonstrating the potential to enhance traditional game design methodologies.
Multi-Camera People Tracking (MCPT) has become an increasingly important research field and has achieved rapid development, but there are still problems such as occlusion, ID change, and tracking loss. So far, most al...
详细信息
ISBN:
(数字)9798350352627
ISBN:
(纸本)9798350352634
Multi-Camera People Tracking (MCPT) has become an increasingly important research field and has achieved rapid development, but there are still problems such as occlusion, ID change, and tracking loss. So far, most algorithms are offline algorithms that use the information of past frames and future frames to match and track using the re-identification method. We propose an online tracking algorithm that can online tracking using just the past 1 frame (named J1F). This method uses the position and appearance features of the target person to perform collaborative analysis between multiple cameras, and uses the majority camera voting method to track the same target person in the current frame. Improve the efficiency of Multi-Camera People Tracking by using a more efficient and robust method. The method was evaluated on the AI City 2024 dataset, and the HOTA reached $70.15 \%$, reducing the time consumption by $31.7 \%$.
In this paper, we introduce a novel normative modeling approach that incorporates focal loss and adversarial autoencoders (FAAE) for Alzheimer’s Disease (AD) diagnosis and biomarker identification. Our method is an e...
详细信息
Internet-connected smart objects in the context of vehicles management are referred to as the Internet of Vehicles (IoV). Testing IoV systems remains a challenge, due to the dynamic nature of IoV, vulnerability to IoV...
详细信息
暂无评论