|
|
|
Hamed Raoofi, Asa Sabahnia, Daniel Barbeau and Ali Motamedi
Traditional methods of supervision in the construction industry are time-consuming and costly, requiring significant investments in skilled labor. However, with advancements in artificial intelligence, computer vision, and deep learning, these methods ca...
ver más
|
|
|
|
|
|
|
Sotirios Kontogiannis, Myrto Konstantinidou, Vasileios Tsioukas and Christos Pikridas
In viticulture, downy mildew is one of the most common diseases that, if not adequately treated, can diminish production yield. However, the uncontrolled use of pesticides to alleviate its occurrence can pose significant risks for farmers, consumers, and...
ver más
|
|
|
|
|
|
|
Xiaoping Jiang, Huilin Zhao, Junwei Liu, Suliang Ma and Mingzhen Hu
To address the problems of difficult online monitoring, low recognition efficiency and the subjectivity of work condition identification in mineral flotation processes, a foam flotation performance state recognition method is developed to improve the iss...
ver más
|
|
|
|
|
|
|
Romil Mishra, Arvind Kumar Mishra and Bhanwar Singh Choudhary
Blasting is a cost-efficient and effective technique that utilizes explosive chemical energy to generate the necessary pressure for rock fragmentation in surface mines. However, a significant portion of this energy is dissipated in undesirable outcomes s...
ver más
|
|
|
|
|
|
|
Theofanis P. Raptis, Claudio Cicconetti, Manolis Falelakis, Grigorios Kalogiannis, Tassos Kanellos and Tomás Pariente Lobo
In terms of the calibre and variety of services offered to end users, smart city management is undergoing a dramatic transformation. The parties involved in delivering pervasive applications can now solve key issues in the big data value chain, including...
ver más
|
|
|
|
|
|
|
Youcef Fouzar, Ahmed Lakhssassi and Ramakrishna Mundugar
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content prov...
ver más
|
|
|
|
|
|
|
Stefan Wagenpfeil, Paul Mc Kevitt and Matthias Hemmje
Multimedia feature graphs are employed to represent features of images, video, audio, or text. Various techniques exist to extract such features from multimedia objects. In this paper, we describe the extension of such a feature graph to represent the me...
ver más
|
|
|
|
|
|
|
Valery Bobkov, Alexey Kudryashov and Alexander Inzartsev
The use of an autonomous underwater vehicle (AUV) to inspect underwater industrial infrastructure requires the precise, coordinated movement of the AUV relative to subsea objects. One significant underwater infrastructure system is the subsea production ...
ver más
|
|
|
|
|
|
|
Nadezhda N. Pokrovskaia, Veronika L. Leontyeva, Marianna Yu. Ababkova, Lucio Cappelli and Fabrizio D?Ascenzo
Social isolation during the pandemic contributed to the transition of educational processes to e-learning. A short-term e-marketing education program for a variety of students was introduced in May 2020 and is taught entirely online. A survey was conduct...
ver más
|
|
|
|
|
|
|
Urbano Eliécer Gómez Prada,Martha Lucía Orellana Hernández,Jesús María Salinas Ibañez
Pág. pp. 4 - 24
This document presents a Decision Support System (DSS) aimed at small livestock farmers who have not made use of Information Technologies (IT) in their production systems. The DSS was built based on the finite difference equations of a simulation model i...
ver más
|
|
|
|