-
3681
-
3682
BED-YOLO: An Enhanced YOLOv10n-Based Tomato Leaf Disease Detection Algorithm
Published 2025-05-01“…The experimental results demonstrated that the improved BED-YOLO model achieved significant performance improvements compared to the original model. …”
Get full text
Article -
3683
Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior
Published 2022-12-01“…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
Get full text
Article -
3684
Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior
Published 2022-12-01“…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
Get full text
Article -
3685
Identification of Low‐Value Defects in Infrared Images of Porcelain Insulators Based on STCE‐YOLO Algorithm
Published 2025-07-01“…To solve the above problems, this paper optimizes the small target and complex environment problems in the low‐value defect recognition of insulator infrared images, and proposes the STCE‐YOLO algorithm: based on YOLOv8, the deformable large kernel attention is used to improve the detection ability of small targets; then the cross‐modal contextual feature module is applied to Integrate the features of different scales to reduce the computation of the model. …”
Get full text
Article -
3686
A Heuristic Optical Flow Scheduling Algorithm for Low-Delay Vehicular Visible Light Communication
Published 2025-07-01“…In response to this problem, we propose a heuristic optical flow scheduling algorithm. First, the optical flow scheduling problem of VVLC is built as a multi-objective optimization model considering the makespan, delay, schedulable ratio, and bandwidth utilization with non-conflict constraints. …”
Get full text
Article -
3687
LG-YOLOv8: A Lightweight Safety Helmet Detection Algorithm Combined with Feature Enhancement
Published 2024-11-01“…Evaluations on the SWHD dataset confirm the effectiveness of the LG-YOLOv8 algorithm. Compared to the original YOLOv8-n algorithm, our approach achieves a mean Average Precision (mAP) of 94.1%, a 59.8% reduction in parameters, a 54.3% decrease in FLOPs, a 44.2% increase in FPS, and a 2.7 MB compression of the model size. …”
Get full text
Article -
3688
Improving the System of Mandatory Requirements to Business under the Digital Transformation of Economy
Published 2023-08-01“…Objective: to elaborate scientifically substantiated proposals for improving the system of mandatory requirements in the sphere of business and other economic activity under formation of digital economy, taking into account the foreign experience of eliminating barriers for business and the available practice of legislation optimization in this sphere.Methods: the research methodological basis consists of traditional general and specific methods of scientific cognition: dialectical, formal-logical, historical-comparative, systematic, terminological, general logic methods (analysis, synthesis, generalization, induction, deduction, etc.), as well as special methods: historical-legal, formal-legal, and method of comparative jurisprudence.Results: the author investigated and systematized theoretical approaches and experience of improving the system of mandatory requirements in foreign countries and the Russian Federation; the possibilities of introducing the most successful innovative legal instruments and practices to improve the regulation of economic relations were considered. …”
Get full text
Article -
3689
Mechanism of Immune System Based Multipath Fault Tolerant Routing Algorithm for Wireless Sensor Networks
Published 2013-12-01“…Mechanism of immune system is applied to do the variation on the initial antibody population, namely, the multiple disjoint paths, to establish the final optimal transmission paths. Mathematical model is established to do the theoretical analysis on the performance of the algorithm. …”
Get full text
Article -
3690
Mobile Robot Path Planning Based on Fused Multi-Strategy White Shark Optimisation Algorithm
Published 2025-07-01“…A novel multi-strategy fusion white shark optimization algorithm is proposed, focusing on actual scenario requirements, to provide optimal solutions for mobile robot path planning. …”
Get full text
Article -
3691
Set-Based Differential Evolution Algorithm Based on Guided Local Exploration for Automated Process Discovery
Published 2020-01-01“…Thirdly, a fine-grained evaluation technique is designed to assign score to each node in a process model, which is employed to guide the local exploration and improve the efficiency of the algorithm. …”
Get full text
Article -
3692
Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems
Published 2025-06-01“…This work contributes three key advancements: (1) an optimized NTRU implementation for medical IoT devices, (2) a novel integration of metaheuristic optimization with post-quantum cryptography, and (3) comprehensive validation across IoMT device classes. …”
Get full text
Article -
3693
Investigating the Performance of Open-Vocabulary Classification Algorithms for Pathway and Surface Material Detection in Urban Environments
Published 2024-11-01“…Our approach uses large language models (LLMs) to improve the accuracy of classifying different pavement types. …”
Get full text
Article -
3694
A cooperative dynamic target search approach for multi-UAV systems utilizing the MAPPO algorithm
Published 2025-07-01“…In response to these issues, this study proposes an improved multi-agent proximal policy optimization algorithm (AS-MAPPO). …”
Get full text
Article -
3695
Stability Analysis and Construction Parameter Optimization of Tunnels in the Fractured Zone of Faults
Published 2022-01-01“…Finally, the actual blasting effect of tunnel construction is tested and the optimization algorithm model of tunnel fault drilling and blasting parameters is established. …”
Get full text
Article -
3696
A self-learning method with domain knowledge integration for intelligent welding sequence planning
Published 2025-07-01“…To improve the interpretability of the results, domain knowledge was integrated into the construction and training processes of a self-learning model. …”
Get full text
Article -
3697
Wood Panel Defect Detection Based on Improved YOLOv8n
Published 2025-02-01“…However, the accuracy and convergence speed of existing defect detection techniques still require improvement. In this paper, an improved algorithm based on YOLOv8n was designed for accurate detection of wood panel defects. …”
Get full text
Article -
3698
-
3699
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01Get full text
Article -
3700