-
561
A KeyBERT-Enhanced Pipeline for Electronic Information Curriculum Knowledge Graphs: Design, Evaluation, and Ontology Alignment
Published 2025-07-01“…To address this gap, this paper presents a KeyBERT-enhanced method for constructing a knowledge graph of the electronic information curriculum system. Utilizing teaching plans, syllabi, and approximately 500,000 words of course materials from 17 courses, we first extracted 500 knowledge points via the Term Frequency–Inverse Document Frequency (TF-IDF) algorithm to build a baseline course–knowledge matrix and visualize the preliminary graph using Graph Convolutional Networks (GCN) and Neo4j. …”
Get full text
Article -
562
Implementing Remote Radiotherapy Planning to Increase Patient Flow at a Johannesburg Academic Hospital, South Africa: Protocol for a Prospective Feasibility Study
Published 2025-07-01“…These findings offer valuable insights into technical integration, quality planning, and workflow outcomes, which can inform the future implementation of effective strategies in resource-constrained settings. …”
Get full text
Article -
563
-
564
Type 1 diabetes prevention clinical trial simulator: Case reports of model‐informed drug development tool
Published 2024-08-01“…To increase the efficiency of clinical trials seeking this goal, our project sought to inform T1D clinical trial designs by developing a disease progression model‐based clinical trial simulation tool. …”
Get full text
Article -
565
-
566
-
567
-
568
-
569
Artificial Bee Colony Algorithm Based on the Division Between Exploration and Exploitation and Its Application in Esophageal Cancer Prediction
Published 2025-07-01“…First, the proposed algorithm will be applied to address more practical problems such as path planning and image processing. …”
Get full text
Article -
570
-
571
-
572
Enhancing small object detection for HCI: BRA-YOLO algorithm with RealSense 3D trajectory tracking
Published 2025-09-01“…The proposed method involves a contactless trajectory planning technique based on computer vision principles. …”
Get full text
Article -
573
-
574
Research on High-Precision Motion Planning of Large Multi-Arm Rock Drilling Robot Based on Multi-Strategy Sampling Rapidly Exploring Random Tree*
Published 2025-04-01“…This mechanism flexibly applies three sampling methods at different stages of path planning, significantly improving the adaptability and search efficiency of the RRT* algorithm. …”
Get full text
Article -
575
Towards a Sustainable Disruptive Growth Model: Integrating Foresight, Wild Cards and Weak Signals Analysis
Published 2025-03-01Get full text
Article -
576
Energy Efficiency in Smart Buildings through Prediction modeling and Optimization Using a Modified Whale Optimization Algorithm
Published 2024-01-01“…The implications of this research extend to the broader field of sustainable architecture and urban planning, paving the way for more informed decisions aimed at reducing energy consumption and fostering environmental sustainability.…”
Get full text
Article -
577
Research on water body information extraction and monitoring in high water table mining areas based on Google Earth Engine
Published 2025-04-01“…The research findings offer a foundation for the formulation of land reclamation and ecological restoration plans in coal mining subsidence areas.…”
Get full text
Article -
578
Evaluation of machine learning algorithm capability for Bosten Lake Wetland classification based on multi-temporal Sentinel-2 data
Published 2024-12-01“…Three classification plans based on vegetation indices, water indices, and textural features were developed using artificial neural network (ANN), support vector machine (SVM), random forest (RF) algorithms. …”
Get full text
Article -
579
STRATEGIC COMPETENCE AS A GUARANTEE OF PROFESSIONAL ACTIVITY OF A MODERN IT SPECIALIST
Published 2023-07-01Get full text
Article -
580
RGB IMAGE BINARY DECOMPOSITION BASED ARABIC AND ENGLISH TEXTS HIDING ALGORITHM WITH 16 CHARACTERS FORMING VIGENERE KEY
Published 2025-07-01“…The main feature of the proposed algorithm can be summarized as offering security without transferring any information relating to the secret texts with the stego image. …”
Get full text
Article