|
|
|
Javad Shahidinejad, Mohsen Kalantari and Abbas Rajabifard
Cadastral databases have been used for over 20 years, but most contain 2D data. The increasing presence of high-rise buildings with modern architecture complicates the process of determining property rights, restrictions, and responsibilities. It is, the...
ver más
|
|
|
|
|
|
|
Shuai Zhang, Heng Wang, Yan Pan, Yun Shao, Tao Zhang, Wei Huang, Yang Li and Bingjie Xu
Dual-polarization division multiplexing (DPDM) is considered to be a potential method to boost the secure key rate (SKR) of the continuous-variable quantum key distribution (CV-QKD) system. In this article, we propose a pilot alternately assisted local l...
ver más
|
|
|
|
|
|
|
Jiangtao Chen, Jiao Zhao, Wei Xiao, Luogeng Lv, Wei Zhao and Xiaojun Wu
Given the randomness inherent in fluid dynamics problems and limitations in human cognition, Computational Fluid Dynamics (CFD) modeling and simulation are afflicted with non-negligible uncertainties, casting doubts on the credibility of CFD. Scientifica...
ver más
|
|
|
|
|
|
|
Yinrui Liu
Liquid argon technology is widely used by many previous and current neutrino experiments, and it is also promising for future large-scale neutrino experiments. When detecting neutrinos using liquid argon, many hadrons are involved, which can also interac...
ver más
|
|
|
|
|
|
|
Hanmin Park, Hyeongseok Kang, Bohyun Hwang, Seonggun Joe and Byungkyu Kim
This study introduces a fruit harvesting mechanism powered by a single motor, designed for integration with unmanned aerial vehicles (UAVs). The mechanism performs reciprocating motion by converting linear motion into rotational motion. Consequently, the...
ver más
|
|
|
|
|
|
|
Jinbo Ren, Chongcheng Chen, Difa Bao, Wuxiong Weng and Shuhe Zheng
Blade cutters are a component in paddy field pulping machines that perform mud splashing, and the design of their structural and motion parameters will directly affect the splashed-mud volume and pulping-machine efficiency. Therefore, the optimization of...
ver más
|
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
|
Yilei Wang, Yuelin Hu, Wenliang Xu and Futai Zou
Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transact...
ver más
|
|
|
|
|
|
|
Mingming Yang, Changhai Qin, Yongnan Zhu, Yong Zhao, Guohua He and Lizhen Wang
Inter-basin water transfer (IBWT) projects are an effective means of addressing regional water resource imbalances. However, owing to the long construction cycle, large investment amount, and wide impact range, water diversion projects exhibit delayed an...
ver más
|
|
|
|
|
|
|
Zheren Liu, Chaogui Kang and Xiaoyue Xing
Similar time series search is one of the most important time series mining tasks in our daily life. As recent advances in sensor technologies accumulate abundant multi-dimensional time series data associated with multivariate quantities, it becomes a pri...
ver más
|
|
|
|