Author of the publication

Unsafe Action Recognition of Miners Based on Video Description.

, , , , , and . GLOBECOM Workshops, page 1-4. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsafe Action Recognition of Miners Based on Video Description., , , , , and . GLOBECOM Workshops, page 1-4. IEEE, (2019)Object Reconstruction Based on Attentive Recurrent Network from Single and Multiple Images., , , , , , , and . Neural Process. Lett., 53 (1): 653-670 (2021)Spatio-Temporal Land-Use Changes and the Response in Landscape Pattern to Hemeroby in a Resource-Based City., , , , , and . ISPRS Int. J. Geo Inf., 9 (1): 20 (2020)A high voltage multiplexer with rail to rail output swing for battery management system applications., , , , , , , and . IEICE Electron. Express, 14 (1): 20161144 (2017)A Review of Machine Learning Algorithms for Text Classification., , , , , and . CNCERT, volume 1506 of Communications in Computer and Information Science, page 226-234. Springer, (2021)KG3D: An Interactive 3D Visualization Tool for Knowledge Graphs., , , , , and . ADMA, volume 11888 of Lecture Notes in Computer Science, page 886-889. Springer, (2019)Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks., , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 240-260. Springer, (2022)Common Developments of Three Incongruent Boxes of Area 30., , , and . TAMC, volume 9076 of Lecture Notes in Computer Science, page 236-247. Springer, (2015)Being Automated or Not? Risk Identification of Occupations with Graph Neural Networks., , , and . ADMA (1), volume 13725 of Lecture Notes in Computer Science, page 520-534. Springer, (2022)Web Application Security Gateway with Java Non-blocking IO., , , , and . NGITS, volume 4032 of Lecture Notes in Computer Science, page 96-105. Springer, (2006)