-
321
Determination of the Cascade Reservoir Operation for Optimal Firm-Energy Using Genetic Algorithms
Published 2013-08-01“…Abstract - Indonesia today face a new paradigm in water management where aim to apply integrated water resources management has become unavoidable task in purpose of achieving greater level of effectiveness and efficiency. …”
Get full text
Article -
322
An innovative complex-valued encoding black-winged kite algorithm for global optimization
Published 2025-01-01“…Abstract The black-winged kite algorithm (BKA) constructed on the black-winged kites’ migratory and predatory instincts is a revolutionary swarm intelligence method that integrates the Leader tactic with the Cauchy variation procedure to retrieve the expansive appropriate convergence solution. …”
Get full text
Article -
323
Ultrasound thyroid nodule segmentation algorithm based on wavelet transform and CNN-Transformer
Published 2025-07-01Get full text
Article -
324
Advances in Surveying Topographically Complex Ecosystems with UAVs: Manta Ray Foraging Algorithms
Published 2024-11-01“…Meanwhile, the ability of the MRFO algorithm to quickly construct approximate high-quality solutions with shortest path lengths in a limited number of iterations validates its potential in practical applications. …”
Get full text
Article -
325
Improved Real-Time SPGA Algorithm and Hardware Processing Architecture for Small UAVs
Published 2025-06-01“…Using these points, the algorithm constructs a feature sub-image containing comprehensive phase error information and performs a non-iterative phase error estimation based on this sub-image. …”
Get full text
Article -
326
Construction and Application of Feature Recommendation Model for Remote Sensing Interpretation of Rock Strata Based on Knowledge Graph
Published 2025-03-01“…This study proposes a geological remote sensing interpretation framework that integrates textual geological data, which enhances lithological identification accuracy by systematically combining multi-source geological knowledge with machine learning algorithms. …”
Get full text
Article -
327
Ground-Level Surface Reconstruction and Soil Volume Estimation in Construction Sites Using Marching Cubes Method
Published 2025-07-01“…Additionally, the marching cubes algorithm completed volume estimation in just 0.05 s, confirming the approach’s accuracy and suitability for real-time applications in dynamic construction environments.…”
Get full text
Article -
328
Methods for the Construction and Editing of an Efficient Control Network for the Photogrammetric Processing of Massive Planetary Remote Sensing Images
Published 2024-12-01“…However, current software tools used by the planetary mapping community to construct and edit control networks exhibit very low efficiency. …”
Get full text
Article -
329
Combining Terrestrial Laser Scanning and Drone-Based Photogrammetry towards Improving Volume Calculations in Construction Projects
Published 2025-08-01“…A low-cost drone was used for data acquisition, whereas Structure from Motion (SFM) and Multi View Stereo (MVS) algorithms were used for processing and analysing the photogrammetric data. …”
Get full text
Article -
330
Multiperiod Location–Allocation Optimization of Construction Logistics Centers for Large-Scale Projects in Complex Environmental Regions
Published 2025-03-01“…Finally, a large-scale railroad construction project in complex environmental regions is used as an example to prove the effectiveness of the model and algorithm. …”
Get full text
Article -
331
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
332
Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption
Published 2025-06-01Get full text
Article -
333
-
334
Early Warning for the Construction Safety Risk of Bridge Projects Using a RS-SSA-LSSVM Model
Published 2021-01-01“…The proposed model integrates a rough set (RS), the sparrow search algorithm (SSA), and the least squares support vector machine (LSSVM). …”
Get full text
Article -
335
Mathematical model of a lightweight three-axle off-road vehicle construction for Arctic zone of Russia
Published 2024-05-01“…The work uses numerical methods to solve the equations of the constructed model, which enables to gradually weaken the accepted assumptions and build more general calculation algorithms. …”
Get full text
Article -
336
-
337
Extrapolation methods for solving the hypersingular integral equation of the first kind
Published 2025-02-01“…An extrapolation algorithm was developed to address this issue. To solve the hypersingular integral equation, we employed superconvergence points as collocation points, thereby constructing an extrapolation algorithm for hypersingular integral equations and establishing its convergence rate. …”
Get full text
Article -
338
-
339
Construction of a Microfluidic Platform for Quantitative Detection of Multiple Fusarium Toxins Based on Upconversion Encoded Microspheres
Published 2025-06-01“…To achieve simultaneous and rapid detection of multiple mycotoxins, a microfluidic chip based on upconversion fluorescent-coded microspheres was constructed and integrated with in vitro diagnostic equipment to develop a quantitative detection platform for mycotoxin. …”
Get full text
Article -
340
The Evolution of Portfolio Theory: Integrating Machine Learning with Markowitz Optimization
Published 2025-01-01Get full text
Article