-
381
Research on Monitoring Nitrogen Content of Soybean Based on Hyperspectral Imagery
Published 2025-05-01Get full text
Article -
382
A Review: The Application of Path Optimization Algorithms in Building Mechanical, Electrical, and Plumbing Pipe Design
Published 2025-06-01“…This review systematically integrates recent advancements in path optimization algorithms for the automated layout of mechanical, electrical, and plumbing (MEP) systems within complex building environments. …”
Get full text
Article -
383
-
384
Assessment of hydrological loading displacement from GNSS and GRACE data using deep learning algorithms
Published 2025-02-01Get full text
Article -
385
Maize crop residue cover mapping using Sentinel-2 MSI data and random forest algorithms
Published 2025-03-01Get full text
Article -
386
Fast grouping fusion method of dual carbon monitoring data based on DBSCAN clustering algorithm
Published 2025-06-01Get full text
Article -
387
The Application of Genetic Algorithm in Seismic Performance Optimization of a Y-Eccentrically Braced Composite Frame
Published 2025-02-01“…An efficient fiber beam–spring element model, which considers the spatial composite effect of the RC slab, was proposed and used to simulate the research objects. …”
Get full text
Article -
388
-
389
Estimation of Tree Canopy Closure Based on U-Net Image Segmentation and Machine Learning Algorithms
Published 2025-05-01Get full text
Article -
390
Monitoring land subsidence through improved CAESAR algorithm in time-series InSAR processing
Published 2024-01-01Get full text
Article -
391
Novel fruit fly algorithm for global optimisation and its application to short-term wind forecasting
Published 2019-07-01“…In order to overcome the shortcoming and improve the precision of solution, we propose a new fruit fly optimisation algorithm (SEDMFOA) based on spatial expansion and dynamic mutation. …”
Get full text
Article -
392
FF-YOLO: An Improved YOLO11-Based Fatigue Detection Algorithm for Air Traffic Controllers
Published 2025-07-01Get full text
Article -
393
Neural network algorithm for optical-SAR image registration based on a uniform grid of points
Published 2024-08-01Get full text
Article -
394
Machine learning applications in river research: Trends, opportunities and challenges
Published 2022-11-01“…In contrast, river researchers have had few applications in multiclass and multilabel algorithm, associate rule and Naïve Bayes. …”
Get full text
Article -
395
High resolution weld semantic defect detection algorithm based on integrated double U structure
Published 2025-05-01Get full text
Article -
396
-
397
-
398
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
399
-
400
Research and application of dynamic simulation method for water accumulation in goaf
Published 2025-08-01Get full text
Article