Search alternatives:
functions » function (Expand Search)
resourcesssss » resourcessssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
functions » function (Expand Search)
resourcesssss » resourcessssss (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
-
381
YOLO-SRMX: A Lightweight Model for Real-Time Object Detection on Unmanned Aerial Vehicles
Published 2025-07-01“…Unmanned Aerial Vehicles (UAVs) face a significant challenge in balancing high accuracy and high efficiency when performing real-time object detection tasks, especially amidst intricate backgrounds, diverse target scales, and stringent onboard computational resource constraints. …”
Get full text
Article -
382
GSF-YOLOv8: A Novel Approach for Fire Detection Using Gather-Distribute Mechanism and SimAM Attention
Published 2025-01-01“…To address the current challenges in fire detection algorithms, including insufficient feature extraction, high computational complexity, limited deployment on resource-constrained devices, missed detections, false detections, and low accuracy, we developed a high-precision algorithm named GSF-YOLOv8. …”
Get full text
Article -
383
Cascaded Directional Coupler-Based Triplexer Working on Spectroscopically Relevant Wavelengths for Multiple Gas Detection
Published 2025-02-01“…The triplexer’s functions focus on enhancing the coupling efficiency and selectivity, while facilitating the on-chip integration of diode lasers. …”
Get full text
Article -
384
Harnessing Deep Learning With AlexNet for Tomato Leaf Disease Detection in the Indian Himalayan Terrain
Published 2025-01-01“…Agriculture is essential for living in the Indian Himalayan region (IHR), as it functions as the main occupation and source of income. …”
Get full text
Article -
385
A diagnosis method based on graph neural networks embedded with multirelationships of intrinsic mode functions for multiple mechanical faults
Published 2025-08-01“…Additionally, a graph-level based fault diagnosis network model is designed to enhance feature learning capabilities for graph samples and enable flexible application across diverse signal sources and devices. Experimental validation with datasets including independent vibration signals for gear fault detection, mixed vibration signals for concurrent gear and bearing faults, and pressure signals for hydraulic cylinder leakage characterization demonstrates the model's adaptability and superior diagnostic accuracy across various types of signals and mechanical systems.…”
Get full text
Article -
386
-
387
CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8.
Published 2025-01-01“…The model achieves precision on par with existing mainstream algorithms, while being simpler, significantly reducing computational requirements, and being more suitable for small target detection tasks. The source code and test results of the models used in this study are available at https://github.com/lyzzzzyy/CSW-YOLO.git.…”
Get full text
Article -
388
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
Get full text
Article -
389
Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors
Published 2024-12-01“…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
Get full text
Article -
390
Rice-SVBDete: a detection algorithm for small vascular bundles in rice stem’s cross-sections
Published 2025-05-01Get full text
Article -
391
Brain tumor detection through image fusion using whale optimization and edge preserving filter
Published 2025-03-01Get full text
Article -
392
-
393
Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading
Published 2021-08-01“…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
Get full text
Article -
394
SILVERRUSH. XIV. Lyα Luminosity Functions and Angular Correlation Functions from 20,000 Lyα Emitters at z ∼ 2.2–7.3 from up to 24 deg2 HSC-SSP and CHORUS Surveys: Linking the Postr...
Published 2025-01-01“…We present luminosity functions (LFs) and angular correlation functions (ACFs) derived from 18,960 Ly α emitters (LAEs) at z = 2.2−7.3 over a wide survey area of ≲24 deg ^2 that are identified in the narrowband data of the HSC-SSP and CHORUS surveys. …”
Get full text
Article -
395
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
Get full text
Article -
396
Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning
Published 2024-01-01“…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
Get full text
Article -
397
Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability
Published 2025-05-01“…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
Get full text
Article -
398
Energy-Efficiency using Critical Nodes Detection Problem in Industrial Wireless Sensor Networks (IWSNs)
Published 2025-03-01“…Experiments simulation validates our proposed approach, approving its efficiency in reducing significant energy consumption while preserving connectivity and functionality for industrial systems. Furthermore, the results highlight the potential of using critical node analysis to support sustainable and efficient operations in resource-constrained industrial environments. …”
Get full text
Article -
399
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article -
400