Detecting the anomalies of web applications, important infrastructures for running modern companies and governments, is crucial for providing reliable web services. Many modern web applications operate on web APIs (e.g., RESTful, SOAP, and WebSockets), their exposure invites intended attacks or unintended illegal visits, causing abnormal system behaviors. However, such anomalies can share very similar logs with normal logs, missing crucial information (which could be in database) for log discrimination. Further, log instances can be also noisy, which can further mislead the state-of-the-art log learning solutions to learn spurious correlation, resulting superficial models and rules for anomaly detection. In this work, we propose MINES which infers explainable API invariants for anomaly detection from the schema level instead of detailed raw log instances, which can (1) significantly discriminate noise in logs to identify precise normalities and (2) detect abnormal behaviors beyond the instrumented logs. Technically, MINES (1) converts API signatures into table schema to enhance the original database shema; and (2) infers the potential database constraints on the enhanced database s
In recent years, open-pit mining has seen significant advancement, the cooperative operation of various specialized machinery substantially enhancing the efficiency of mineral extraction. However, the harsh environment and complex conditions in open-pit mines present substantial challenges for the implementation of autonomous transportation systems. This research introduces a novel paradigm that integrates Scenario Engineering (SE) with autonomous transportation systems to significantly improve the trustworthiness, robustness, and efficiency in open-pit mines by incorporating the four key components of SE, including Scenario Feature Extractor, Intelligence and Index (I&I), Calibration and Certification (C&C), and Verification and Validation (V&V). This paradigm has been validated in two famous open-pit mines, the experiment results demonstrate marked improvements in robustness, trustworthiness, and efficiency. By enhancing the capacity, scalability, and diversity of autonomous transportation, this paradigm fosters the integration of SE and parallel driving and finally propels the achievement of the '6S' objectives.
Underground mining operations are actively exploring the use of large-format lithium-ion batteries (LIBs) to power their equipment. LIBs have high energy density, long cycle life, and favorable safety record. They also have low noise, heat, and emission footprints. This fosters a conducive workplace environment for underground mining personnel. However, many occurrences of LIB failure have resulted in dangerous situations in underground mines. The combustion products, including toxic emissions, can rapidly travel throughout the mine using the ventilation network. Therefore, it is critical to monitor the temperature and smoke concentration underground at all times to ensure the safety of the miners. High-fidelity models can be developed for specific scenarios of LIB failure, but are computationally prohibitive for large underground mine volumes, complex geometries, and long duration combustion events. To mitigate computation-related issues associated with high-fidelity models, we developed cyber-physical systems (CPS) models to examine temperature and smoke dynamics. The mine supervisory control center, acting as the cyber framework, operates in conjunction with the physical undergr
This study introduces a stochastic model of COVID-19 transmission tailored to the Colorado School of Mines campus and evaluates surveillance testing strategies within a university context. Enhancing the conventional SEIR framework with stochastic transitions, our model accounts for the unique characteristics of disease spread in a residential college, including specific states for testing, quarantine, and isolation. Employing an approximate Bayesian computation (ABC) method for parameter estimation, we navigate the complexities inherent in stochastic models, enabling an accurate fit of the model with the campus case data. We then studied our model under the estimated parameters to evaluate the efficacy of different testing policies that could be implemented on a university campus. This framework not only advances understanding of COVID-19 dynamics on the Mines campus but serves as a blueprint for comparable settings, providing insights for informed strategies against infectious diseases.
This study aims to establish the causal relationship network between various factors leading to workday loss in underground coal mines using a novel causal artificial intelligence (AI) method. The analysis utilizes data obtained from the National Institute for Occupational Safety and Health (NIOSH). A total of 101,010 injury records from 3,982 unique underground coal mines spanning the years from 1990 to 2020 were extracted from the NIOSH database. Causal relationships were analyzed and visualized using a novel causal AI method called Grouped Greedy Equivalence Search (GGES). The impact of each variable on workday loss was assessed through intervention do-calculus adjustment (IDA) scores. Model training and validation were performed using the 10-fold cross-validation technique. Performance metrics, including adjacency precision (AP), adjacency recall (AR), arrowhead precision (AHP), and arrowhead recall (AHR), were utilized to evaluate the models. Findings revealed that after 2006, key direct causes of workday loss among mining employees included total mining experience, mean office employees, mean underground employees, county, and total mining experience (years). Total mining exp
One critical bottleneck that impedes the development and deployment of autonomous transportation in open-pit mines is guaranteed robustness and trustworthiness in prohibitively extreme scenarios. In this research, a novel scenarios engineering (SE) methodology for the autonomous mining truck is proposed for open-pit mines. SE increases the trustworthiness and robustness of autonomous trucks from four key components: Scenario Feature Extractor, Intelligence & Index (I&I), Calibration & Certification (C&C), and Verification & Validation (V&V). Scenario feature extractor is a comprehensive pipeline approach that captures complex interactions and latent dependencies in complex mining scenarios. I&I effectively enhances the quality of the training dataset, thereby establishing a solid foundation for autonomous transportation in mining areas. C&C is grounded in the intrinsic regulation, capabilities, and contributions of the intelligent systems employed in autonomous transportation to align with traffic participants in the real world and ensure their performance through certification. V&V process ensures that the autonomous transportation system can be
Detecting disasters in underground mining, such as explosions and structural damage, has been a persistent challenge over the years. This problem is compounded for first responders, who often have no clear information about the extent or nature of the damage within the mine. The poor-light or even total darkness inside the mines makes rescue efforts incredibly difficult, leading to a tragic loss of life. In this paper, we propose a novel instance segmentation method called DIS-Mine, specifically designed to identify disaster-affected areas within underground mines under low-light or poor visibility conditions, aiding first responders in rescue efforts. DIS-Mine is capable of detecting objects in images, even in complete darkness, by addressing challenges such as high noise, color distortions, and reduced contrast. The key innovations of DIS-Mine are built upon four core components: i) Image brightness improvement, ii) Instance segmentation with SAM integration, iii) Mask R-CNN-based segmentation, and iv) Mask alignment with feature matching. On top of that, we have collected real-world images from an experimental underground mine, introducing a new dataset named ImageMine, specific
In this work, we present an autonomous inspection framework for remote sensing tasks in active open-pit mines. Specifically, the contributions are focused towards developing a methodology where an initial approximate operator-defined inspection plan is exploited by an online view-planner to predict an inspection path that can adapt to changes in the current mine-face morphology caused by route mining activities. The proposed inspection framework leverages instantaneous 3D LiDAR and localization measurements coupled with modelled sensor footprint for view-planning satisfying desired viewing and photogrammetric conditions. The efficacy of the proposed framework has been demonstrated through simulation in Feiring-Bruk open-pit mine environment and hardware-based outdoor experimental trials. The video showcasing the performance of the proposed work can be found here: https://youtu.be/uWWbDfoBvFc
Coalbed methane embedded in coal seams, is an unconventional energy resource as well as a hazardous gas existing in mining industries, which attracts lots of global attention. As the largest coal producer, the mining industry in China had to deal with many hazards induced by methane for decades. To solve this issue, underground methane extraction is commonly used in underground coal mines. However, underground methane extraction is hampered by low production rate and low efficiency because of slow gas emission from coal primarily controlled by gas desorption and permeability. It is well known that temperature has a great impact on gas sorption. The higher the temperature the larger the desorption rate. As the depth of coal mines increases beyond 1000m coal mines suffer elevated air temperatures caused by the natural geothermal gradient. The elevated temperature in such mines provides a potential economical way for geothermal energy extraction and utilization in deep coal mines which can largely cut the expenses of installation and operation maintenance. Therefore, a novel method is proposed to enhance underground methane extraction by deep heat stimulation. This paper mainly presen
Two years of satellite observations were used to quantify methane emission from coal mines in Queensland, the largest coal-producing state in Australia. The six analyzed surface and underground coal mines are estimated to emit 570+/-98 Gg a-1 in 2018-2019. Together, they account for 7% of the national coal production, while emitting 55+/-10% of the reported methane emission from coal mining in Australia. Our results indicate that for two of the three locations our satellite-based estimates are significantly higher than reported to the Australian government. Most remarkably, 40% of the quantified emission came from a single surface mine (Hail Creek) located in a methane-rich coal basin. Our findings call for increased monitoring and investment in methane recovery technologies for both surface and underground mines.
The observations show that the collapse of underground limestone mines results from a progressive failure due to gradual weathering of the rockmass. The following stages can be considered for the limestone weathering and degradation process in underground mines: condensation of the water on the roof of the gallery, infiltration of water in the porous rock, migration of the air CO2 molecules in the rock pore water by convection and molecular diffusion, dissolution of limestone by CO2 rich water and consequently, reduction of the strength properties of rock. Considering this process, a set of equations governing different hydrochemo-mechanical aspects of the weathering phenomenon and progressive failure occurring in these mines is presented. Then the feasibility of numerical modelling of this process is studied and a simple example of application is presented.
Among different types of hazards associated with underground mining in Polish copper mines, one of the most dangerous is rock burst hazard. Having in mind that the depth of exploitation is getting deeper, this problem will likely get worse in the near future. This kind of hazard is connected inherently with seismic events. Controlled group blasting within a potentially unstable roof stratum is considered as an active method of rock burst prevention. A number of recorded seismic events can be clearly and directly explained by the blasting works effects. With electronic detonators, it is possible to achieve a precise delay time between the detonation of explosives in the individual blastholes and mining faces. Within the framework of this paper, the analysis of seismograms recorded during selected blasting works differing in applied initiation systems, i.e. non-electric and electronic was carried out. It was assumed that this approach may be treated as a new blasting method of rock burst control in deep mines conditions or can be the basis for the modification of the currently used method.
Antropogenic seismicity is one of the most important geomechanical hazard encountered in Polish deep copper mines. Obviously, it may have a negative impact on the peoples safety and the production process. In such circumstances, a number of both active and passive prevention measures have been implemented in the mines, at least partially. One of the most effective, applied for many years, active means used for seismic hazard reduction, is multi-faces blasting works which by assumption should result in release of strain energy accumulated in the rock mass by inducing seismic events in the areas of high strain concentrations. However, at the stage of blasting works design process, a most of attention is paid rather on the vibration amplitude increasing than on the effect of its frequencies. In result, one of the basic parameters of induced seismic waves, which is the frequency of vibrations is usually omitted. Nowadays, the frequency of the seismic wave initiated by firing of group of faces is basically out of control due to the low accuracy of detonators utilized today. Taking the above into account, the possibility of increasing the effectiveness of blasting provocation by controll
Modelling and simulating mine counter measure search missions performed by autonomous vehicles equipped with a sensor capable of detecting mines at sea is a challenging endeavour. To address this, we formulated and implemented the problem as a stochastic optimal control model. Our implementation computes an optimal path within a user chosen quadrilateral domain such that the mission duration is minimized for a given residual risk of undetected sea mines. First, we compare the stochastic optimal control implementation against the traditionally used boustrophedon implementation. We show that the mission duration in case of the stochastic optimal control implementation is shorter. Then, by building on our previous work, we introduce a novel mathematical approach that enables multiple autonomous survey vehicles to investigate the domain concurrently. We present results for up to six vehicles, including computed trajectories and an analysis of how mission duration varies with the number of vehicles. Our findings show that mission time decreases non-linearly, , i.e., we observe diminishing returns as more vehicles are added.
Mining is rapidly evolving into an AI driven cyber physical ecosystem where safety and operational reliability depend on robust perception, trustworthy distributed intelligence, and continuous monitoring of miners and equipment. However, real world mining environments impose severe constraints, including poor illumination, GPS denied conditions, irregular underground topologies and intermittent connectivity. These factors degrade perception accuracy, disrupt situational awareness and weaken distributed learning systems. At the same time, emerging cyber physical threats such as backdoor triggers, sensor spoofing, label flipping attacks, and poisoned model updates further jeopardize operational safety as mines adopt autonomous vehicles, humanoid assistance, and federated learning for collaborative intelligence. Energy constrained sensors also experience uneven battery depletion, creating blind spots in safety coverage and disrupting hazard detection pipelines. This paper presents a vision for a Unified Smart Safety and Security Architecture that integrates multimodal perception, secure federated learning, reinforcement learning, DTN enabled communication, and energy aware sensing int
Given the importance of monitoring the operational status of high-voltage cables in coal mines, this study investigates the application of intelligent sensing technology to the online monitoring of such cables. Taking an actual coal mine as a case study, a three-layer architecture high-voltage cable monitoring system was designed. The system employs high-frequency current sensors and distributed optical fiber temperature sensors to achieve real-time acquisition of partial discharge signals and temperature distribution data. Data analysis and fault diagnosis are performed through a combined approach of edge computing and cloud computing. The research results demonstrate that the system can accurately identify cable insulation defects and potential overheating hazards, with a diagnostic accuracy exceeding 95%, thereby significantly enhancing the reliability of power supply in mines.
Underground mining operations rely on distributed sensor networks to collect critical data daily, including mine temperature, toxic gas concentrations, and miner movements for hazard detection and operational decision-making. However, transmitting raw sensor data to a central server for training deep learning models introduces significant privacy risks, potentially exposing sensitive mine-specific information. Federated Learning (FL) offers a transformative solution by enabling collaborative model training while ensuring that raw data remains localized at each mine. Despite its advantages, FL in underground mining faces key challenges: (i) An attacker may compromise a mine's local model by employing techniques such as sign-flipping attacks or additive noise, leading to erroneous predictions; (ii) Low-quality (yet potentially valuable) data, caused by poor lighting conditions or sensor inaccuracies in mines may degrade the FL training process. In response, this paper proposes MineDetect, a defense FL framework that detects and isolates the attacked models while mitigating the impact of mines with low-quality data. MineDetect introduces two key innovations: (i) Detecting attacked mod
Modelling and simulating mine countermeasures search missions performed by autonomous vehicles equipped with a sensor capable of detecting mines at sea is a challenging endeavour. The output of our stochastic optimal control implementation consists of an optimal trajectory in a square domain for the autonomous vehicle such that the total mission time is minimized for a given residual risk of not detecting sea mines. We model this risk as an expected value integral. We found that upon completion of the simulation, the user requested residual risk is usually not satisfied. We solved this by implementing a relaxation strategy which consists of incrementally increasing the square search domain. We then combined this strategy with different quasi-Monte Carlo schemes used for solving the integral. We found that using a Rank-1 Lattice scheme yields a speedup up to a factor two with respect to the Monte Carlo scheme. We also present an implementation which allows us to compute a trajectory in a convex quadrilateral domain, as opposed to a square domain, and combine it with our relaxation strategy.
Bitcoin's security relies on its Proof-of-Work consensus, where miners solve puzzles to propose blocks. The puzzle's difficulty is set by the difficulty adjustment mechanism (DAM), based on the network's available mining power. Attacks that destroy some portion of mining power can exploit the DAM to lower difficulty, making such attacks profitable. In this paper, we analyze three types of mining power destruction attacks in the presence of petty-compliant mining pools: selfish mining, bribery, and mining power distraction attacks. We analyze selfish mining while accounting for the distribution of mining power among pools, a factor often overlooked in the literature. Our findings indicate that selfish mining can be more destructive when the non-adversarial mining share is well distributed among pools. We also introduce a novel bribery attack, where the adversarial pool bribes petty-compliant pools to orphan others' blocks. For small pools, we demonstrate that the bribery attack can dominate strategies like selfish mining or undercutting. Lastly, we present the mining distraction attack, where the adversarial pool incentivizes petty-compliant pools to abandon Bitcoin's puzzle and min
Social media enables data-driven analysis of public opinion on contested issues. Target-Stance Extraction (TSE) is the task of identifying the target discussed in a document and the document's stance towards that target. Many works classify stance towards a given target in a multilingual setting, but all prior work in TSE is English-only. This work introduces the first multilingual TSE benchmark, spanning Catalan, Estonian, French, Italian, Mandarin, and Spanish corpora. It manages to extend the original TSE pipeline to a multilingual setting without requiring separate models for each language. Our model pipeline achieves a modest F1 score of 12.78, underscoring the increased difficulty of the multilingual task relative to English-only setups and highlighting target prediction as the primary bottleneck. We are also the first to demonstrate the sensitivity of TSE's F1 score to different target verbalizations. Together these serve as a much-needed baseline for resources, algorithms, and evaluation criteria in multilingual TSE.