Suggested Topics within your search.
Suggested Topics within your search.
-
4281
Quantification of chlorophyll-a in inland waters by remote sensing algorithm based on modified equivalent spectra of Sentinel-2
Published 2025-07-01“…The development of remote sensing algorithms has traditionally relied on satellite spectra or simulated equivalents derived from in-situ spectra to monitor inland water quality. …”
Get full text
Article -
4282
-
4283
-
4284
-
4285
A multi-objective mathematical model for the multi-warehouse order picking system using Benders decomposition algorithm
Published 2023-11-01“…The calculation results obtained from the implementation of the solution methods for the proposed model showed that in terms of the number of iterations and the calculation time, the accelerated Benders algorithm had better results than the classic Benders algorithm.Originality/Value: In this research, the order-picking problem with the integrity of operational decisions has been formulated as a multi-objective mathematical model for a multi-warehouse environment for the first time. …”
Get full text
Article -
4286
-
4287
-
4288
-
4289
-
4290
DYNAMICS OF URBAN LANDSCAPE AND ITS THERMAL INTERACTIONS WITH SELECTED LAND COVER TYPES: A CASE OF BENIN CITY, NIGERIA
Published 2023-09-01“…The maximum likelihood algorithm for land use and land cover (LULC) analysis was used to categorise Landsat images. …”
Get full text
Article -
4291
Resolution enhanced sea ice concentration: a new algorithm applied to AMSR2 microwave radiometry data
Published 2025-01-01Get full text
Article -
4292
Design and Build a Notary MIS Using the AES 256 Algorithm at a Web-Based Notary Office
Published 2024-12-01“…This research aims to design and develop a web-based Notary Management Information System (MIS) incorporating the AES 256 encryption algorithm to enhance data management and security in notary offices. …”
Get full text
Article -
4293
-
4294
-
4295
Discovering sequential patterns and interrelations among multiple diseases in electronic medical records using cSPADE algorithm
Published 2025-04-01“…Conclusion Our findings demonstrate the effectiveness of the constrained SPADE (cSPADE) algorithm in comorbidity research and highlight several clinically significant sequential comorbidity patterns. …”
Get full text
Article -
4296
Comparison of the Performance of the C.45 Algorithm with Naive Bayes in Analyzing Book Borrowing at the Library Pringsewu Muhammadiyah University
Published 2025-01-01“…These results demonstrate that C4.5 is more adept at capturing complex relationships within the data, providing deeper insights into user preferences and enhancing library services. This research underscores the potential of data mining techniques to optimize library management and proposes avenues for future investigation, such as exploring advanced machine learning algorithms and expanding datasets for use in broader library contexts.…”
Get full text
Article -
4297
-
4298
Few-shot hotel industry site selection prediction method based on meta learning algorithms and transportation accessibility
Published 2025-05-01“…Therefore, this paper takes the star-rated hotels in the six districts of Tianjin as the research subject and proposes a few-shot hotel location prediction method based on meta-learning algorithms and transportation accessibility. …”
Get full text
Article -
4299
Comparison of K-Means and K-Medoids Algorithms for Clustering Poverty Data in South Sumatra Using DBI Evaluation
Published 2024-11-01“…This research focuses on the implementation and comparison of the K-Means and K-Medoids algorithms that function as poverty data clustering in South Sumatra Province, the poverty data is taken from the Central Statistics Agency of Indonesia (BPS Indonesia). …”
Get full text
Article -
4300
Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA
Published 2020-06-01“…This condition made image file fingerprinting need more time to compile jpeg/exif fingerprint. This research purpose is to develop fingerprinting process for jpeg/exif file using Boyer-Moore string matching algorithm and SHA512. …”
Get full text
Article