Search alternatives:
functions » function (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
-
401
CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8.
Published 2025-01-01“…The model achieves precision on par with existing mainstream algorithms, while being simpler, significantly reducing computational requirements, and being more suitable for small target detection tasks. The source code and test results of the models used in this study are available at https://github.com/lyzzzzyy/CSW-YOLO.git.…”
Get full text
Article -
402
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
Get full text
Article -
403
Automated Artery Detection and Stenosis Classification in CTA Using Deep Learning for Peripheral Arterial Disease
Published 2025-01-01“…We use Faster R-CNN with a ResNet-101 backbone driven by a custom loss function to achieve good artery localization and reduce false positives. …”
Get full text
Article -
404
F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection
Published 2025-01-01“…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
Get full text
Article -
405
DNA-Based Nanobiosensor for the Colorimetric Detection of Dengue Virus Serotype 2 Synthetic Target Oligonucleotide
Published 2025-01-01“…Being a developing country, most of the high-risk areas in the Philippines are resource-limited and cannot afford equipment for detection and monitoring. …”
Get full text
Article -
406
GastroEndoNet: Comprehensive endoscopy image dataset for GERD and polyp detectionMendeley Data
Published 2025-06-01“…It provides an invaluable resource for developing machine learning models aimed at the automatic diagnosis, classification, and detection of GERD and polyps, potentially improving the speed and accuracy of clinical decision-making. …”
Get full text
Article -
407
From fish to fiber: 3D-nanoprinted optical neuromast for multi-integrated underwater detection
Published 2025-08-01“…Abstract Fish possess high sensitivity to acoustic, vibrational, and hydrodynamic stimuli through unique sensing cells, providing unparalleled paradigms for developing underwater detection methods. However, artificial perception devices face challenges in replicating comparable sensitivity and multi-dimensional integration of fish in function and scale. …”
Get full text
Article -
408
Enhancing Human Detection in Occlusion-Heavy Disaster Scenarios: A Visibility-Enhanced DINO (VE-DINO) Model with Reassembled Occlusion Dataset
Published 2025-01-01“…VE-DINO enhances detection accuracy by incorporating body part key point information and employing a specialized loss function. …”
Get full text
Article -
409
-
410
Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors
Published 2024-12-01“…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
Get full text
Article -
411
Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region
Published 2025-02-01“…Compared to various lightweight architectures and advanced detection models, this method demonstrates excellent accuracy, lower computational costs, and better real-time performance, providing a feasible coal mine pedestrian-vehicle detection method for resource-constrained coal mine scenarios, meeting the deployment requirements of coal mine video surveillance and enabling real-time alerts for intelligent inspection of coal mine pedestrian-vehicles.…”
Get full text
Article -
412
-
413
Brain tumor detection through image fusion using whale optimization and edge preserving filter
Published 2025-03-01Get full text
Article -
414
Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading
Published 2021-08-01“…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
Get full text
Article -
415
SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr...
Published 2025-01-01“…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
Get full text
Article -
416
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
Get full text
Article -
417
-
418
Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability
Published 2025-05-01“…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
Get full text
Article -
419
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article -
420
Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring
Published 2022-11-01“…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
Get full text
Article