|
|
|
Angeliki Mentzafou, Yiannis Panagopoulos and Elias Dimitriou
Water quality indices that describe the status of water are commonly used in freshwater vulnerability assessment. The design of river water quality monitoring programs has always been a complex process and despite the numerous methodologies employed by e...
ver más
|
|
|
|
|
|
|
Masoud Jafari Shalamzari, Wanchang Zhang, Atefeh Gholami and Zhijie Zhang
Site selection for runoff harvesting at large scales is a very complex task. It requires inclusion and spatial analysis of a multitude of accurately measured parameters in a time-efficient manner. Compared with direct measurements of runoff, which is tim...
ver más
|
|
|
|
|
|
|
Wiwin Budiarti,Evi Gravitiani,Mujiyo Mujiyo
Pág. 96 - 108
Floods a main problem in Samin sub watershed, which is part of the Bengawan Solo watershed, Central Java Province. Assessment of the flood vulnerability level and its determinant causes is required as a basis information for policy makers to design a flo...
ver más
|
|
|
|
|
|
|
Wenjie Zhen, Shifang Huang, Zhihui Tian and Xiaoyue Yang
Tourist maps provide tourists with destination information that reflects their unique characteristics and cultural connotations and play an important role in attracting tourists and serving marketing purposes. However, existing designs of tourist maps of...
ver más
|
|
|
|
|
|
|
Bo Cui, Lingyun Wang, Guangxi Li and Xian Ren
The dynamic star simulator is a commonly used ground-test calibration device for star sensors. For the problems of slow calculation speed, low integration, and high power consumption in the traditional star chart simulation method, this paper designs a F...
ver más
|
|
|
|
|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Georg Gartner, Olesia Ignateva, Bibigul Zhunis and Johanna Pühringer
Maps are the culmination of numerous choices, with many offering multiple alternatives. Not all of these choices are inherently guided by default, clarity, or universally accepted best practices, guidelines, or recommendations. In the realm of cartograph...
ver más
|
|
|
|
|
|
|
Wenji Yang and Xiaoying Qiu
The damage caused by pests to crops results in reduced crop yield and compromised quality. Accurate and timely pest detection plays a crucial role in helping farmers to defend against and control pests. In this paper, a novel crop pest detection model na...
ver más
|
|
|
|
|
|
|
Bowen Xing, Xiao Wang and Zhenchong Liu
The path planning strategy of deep-sea mining vehicles is an important factor affecting the efficiency of deep-sea mining missions. However, the current traditional path planning algorithms suffer from hose entanglement problems and small coverage in the...
ver más
|
|
|
|
|
|
|
Sharoon Saleem, Fawad Hussain and Naveed Khan Baloch
Network on Chip (NoC) has emerged as a potential substitute for the communication model in modern computer systems with extensive integration. Among the numerous design challenges, application mapping on the NoC system poses one of the most complex and d...
ver más
|
|
|
|