-
561
-
562
Enhancing Human Detection in Occlusion-Heavy Disaster Scenarios: A Visibility-Enhanced DINO (VE-DINO) Model with Reassembled Occlusion Dataset
Published 2025-01-01“…VE-DINO enhances detection accuracy by incorporating body part key point information and employing a specialized loss function. …”
Get full text
Article -
563
-
564
Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region
Published 2025-02-01“…Compared to various lightweight architectures and advanced detection models, this method demonstrates excellent accuracy, lower computational costs, and better real-time performance, providing a feasible coal mine pedestrian-vehicle detection method for resource-constrained coal mine scenarios, meeting the deployment requirements of coal mine video surveillance and enabling real-time alerts for intelligent inspection of coal mine pedestrian-vehicles.…”
Get full text
Article -
565
Energy-Efficiency using Critical Nodes Detection Problem in Industrial Wireless Sensor Networks (IWSNs)
Published 2025-03-01“…Experiments simulation validates our proposed approach, approving its efficiency in reducing significant energy consumption while preserving connectivity and functionality for industrial systems. Furthermore, the results highlight the potential of using critical node analysis to support sustainable and efficient operations in resource-constrained industrial environments. …”
Get full text
Article -
566
Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms
Published 2024-01-01“…Although various technologies with wearables and vision systems that utilize artificial intelligence (AI) have been developed to detect falls, many AI models are complex and resource-intensive. …”
Get full text
Article -
567
Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning
Published 2024-01-01“…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
Get full text
Article -
568
F-OSFA: A Fog Level Generalizable Solution for Zero-Day DDOS Attacks Detection
Published 2025-01-01“…The third component is a signature-based resource usage analyzer to counter attacks mimicking normal traffic. …”
Get full text
Article -
569
DNA-Based Nanobiosensor for the Colorimetric Detection of Dengue Virus Serotype 2 Synthetic Target Oligonucleotide
Published 2025-01-01“…Being a developing country, most of the high-risk areas in the Philippines are resource-limited and cannot afford equipment for detection and monitoring. …”
Get full text
Article -
570
DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK
Published 2025-06-01“…The approach integrates a Decision Tree (DT) algorithm for rapid initial classification of Primary User (PU) activity, followed by a Hill Climbing (HC) optimization algorithm that fine-tunes the detection based on a fitness function. Entropy and throughput metrics are employed as decision conditions at each sensing channel, enhancing uncertainty measurement and maintaining detection robustness under low Signal-to-Noise Ratio (SNR) conditions. …”
Get full text
Article -
571
DSFA-SwinNet: A Multi-Scale Attention Fusion Network for Photovoltaic Areas Detection
Published 2025-01-01Get full text
Article -
572
TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5
Published 2025-05-01“…Finally, the EIOU loss function is introduced to measure the overlap between the predicted box and the real box more accurately and improve the detection accuracy. …”
Get full text
Article -
573
YOLOv8n-DDSW: an efficient fish target detection network for dense underwater scenes
Published 2025-04-01“…Therefore, the YOLOv8n-DDSW fish target detection algorithm was proposed in this article to resolve the detection difficulties resulting from fish occlusion, deformation and detail loss in complex intensive aquaculture scenarios. (1) The C2f-deformable convolutional network (DCN) module is proposed to take the place of the C2f module in the YOLOv8n backbone to raise the detection accuracy of irregular fish targets. (2) The dual-pooling squeeze-and-excitation (DPSE) attention mechanism is put forward and integrated into the YOLOv8n neck network to reinforce the features of the visible parts of the occluded fish target. (3) Small detection is introduced to make the network more capable of sensing small targets and improving recall. (4) Wise intersection over union (IOU) rather than the original loss function is used for improving the bounding box regression performance of the network. …”
Get full text
Article -
574
-
575
Rice-SVBDete: a detection algorithm for small vascular bundles in rice stem’s cross-sections
Published 2025-05-01Get full text
Article -
576
Multivariate GWAS analysis reveals loci associated with liver functions in continental African populations.
Published 2023-01-01“…<h4>Conclusions</h4>Using multivariate GWAS method improves the power to detect novel genotype-phenotype associations for liver functions not found with the standard univariate GWAS in the same dataset.…”
Get full text
Article -
577
-
578
-
579
Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction
Published 2016-01-01“…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
Get full text
Article -
580