Protecting Mining Environments from Blasting through Impact Prediction Studies

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Against Data Mining through Samples

Data mining introduces new problems in database security. The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the “probabilistic” inferences possible with data mining. This paper shows how lower bounds from pattern recognition theory can be used to determine sample sizes where data mining tools cannot obtain reliable results.

متن کامل

Blasting through lattice calculations using CUDA

Modern graphics hardware is designed for highly parallel numerical tasks and provides significant cost and performance benefits. Graphics hardware vendors are now making available development tools to support general purpose high performance computing. Nvidia’s CUDA platform, in particular, offers direct access to graphics hardware through a programming language similar to C. Using the CUDA pla...

متن کامل

A data mining approach for location prediction in mobile environments

Mobility prediction is one of the most essential issues that need to be explored for mobility management in mobile computing systems. In this paper, we propose a new algorithm for predicting the next inter-cell movement of a mobile user in a Personal Communication Systems network. In the first phase of our threephase algorithm, user mobility patterns are mined from the history of mobile user tr...

متن کامل

Mining Users’ Behaviors and Environments for Semantic Place Prediction

In this work, we propose a novel prediction framework, which takes into account the spatial property, temporal property, users’ behavior and environment at the same time, for semantic place prediction. The core idea of our proposal is to extract features to represent end users’ behaviors in each place related to its semantic. To achieve this goal, we define 54 features to represent end users’ b...

متن کامل

Protecting Web Passwords from Rogue Servers using Trusted Execution Environments

Passwords are undoubtedly the most dominant user authentication mechanism on the web today. Although they are inexpensive and easy-to-use, security concerns of passwordbased authentication are serious. Phishing and theft of password databases are two critical concerns. The tendency of users to reuse passwords across different services exacerbates the impact of these two concerns. Current soluti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Geoscience and Environment Protection

سال: 2018

ISSN: 2327-4336,2327-4344

DOI: 10.4236/gep.2018.65011