-
3901
GGSYOLOv5: Flame recognition method in complex scenes based on deep learning.
Published 2025-01-01“…Firstly, a global attention mechanism (GAM) was added to the CSP1 module in the backbone part of the YOLOv5 network, and then a parameterless attention mechanism was added to the feature fusion part. Finally, packet random convolution (GSConv) was used to replace the original convolution at the output end. …”
Get full text
Article -
3902
Populisme et gestion national-populaire du pouvoir en Bolivie : l’expérience du Mouvement nationaliste révolutionnaire – MNR– (1952-1964)
Published 2005-09-01“…Furthermore it is characterized by porosity and even fusion between the public and the private, which thrives on the traditional links of social reciprocity and State domination – and thus generates a specific mode of political management. …”
Get full text
Article -
3903
Improved GOA-based fuzzy PI speed control of PMSM with predictive current regulation.
Published 2025-01-01“…First, the diversity of the population and the global exploration capability of the algorithm are enhanced through the integration of the Cauchy mutation strategy and uniform distribution strategy. Subsequently, the fusion of Cauchy mutation and opposition-based learning, along with modifications to the optimal position, further improves the algorithm's ability to escape local optima. …”
Get full text
Article -
3904
Poetry as Pagan Pilgrimage: the ‘Animative Impulse’ of Thomas Hardy’s Verse
Published 2014-09-01“…Hardy’s interest in the fusion of Pagan and Christian beliefs, present in the surfacing traces of the past, actually depends on the human associations to be found there. …”
Get full text
Article -
3905
Dysregulation of Mitochondrial Homeostasis in Cardiovascular Diseases
Published 2025-01-01“…In this review, we will discuss these imbalances and, in particular, the potential role of mitochondrial fusion, fission, biogenesis, and mitophagy in the context of vascular diseases and how the dysregulation of normal function might contribute to disease progression. …”
Get full text
Article -
3906
Spoof speech detection based on context information and attention feature
Published 2023-02-01“…With the rapid development of speech synthesis and speech conversion technology, methods of spoof speech detection still have problems such as low spoof detection accuracy and poor generality.Therefore, an end-to-end spoof detection method based on context information and attention feature was proposed.Based on deep residual shrinkage network (DRSN), the proposed method used the dual-branch context information coordination fusion module (DCCM) to aggregate rich context information, and fused features based on coordinate time-frequency attention (CTFA) to obtain cross-dimensional interaction features with context information, thus maximizing the potential of capturing artifacts.Compared with the best baseline system, in the ASVspoof 2019 LA dataset, the proposed method had reduced the EER and t-DCF performance indicators by 68% and 65% respectively, in the ASVspoof 2021 LA dataset, the EER and t-DCF of the proposed method were 4.81 and 0.311 5 and dropped by 48% and 10% separately.The experimental results show that this method can effectively improve the accuracy and generalization ability of spoof speech detection.…”
Get full text
Article -
3907
Multi-data fusionaided indoor localization based on continuous action space deep reinforcement learning
Published 2024-03-01“…Significant attention has been paid to indoor localization using smartphones in both research and industry.However, the accuracy and robustness of localization remain challenging issues, particularly in complex indoor environments.In light of the prevalent incorporation of pedestrian dead reckoning (PDR) devices in contemporary smartphones, an advanced indoor localization fusion method, anchored in the twin delayed deep deterministic policy gradient (TD3) framework, was proposed.In this approach, a seamless integration of Wi-Fi information and PDR data was achieved.The localization process of PDR was modeled as a Markov process, and a comprehensive continuous action space was introduced for the agent.To evaluate the performance of the proposed method, experiments were conducted and this approach was compared with three state-of-the-art deep Q network (DQN) based indoor localization methods.The experimental results demonstrate that the proposed method significantly reduces localization errors and enhances overall localization accuracy.…”
Get full text
Article -
3908
Abnormal traffic detection method based on multi-scale attention feature enhancement
Published 2024-11-01“…Finally, a feature enhancement network was used to increase the distinctiveness and expressiveness of local and global features, which were then fused using a weighted fusion approach to achieve abnormal traffic detection. …”
Get full text
Article -
3909
Network Anomaly Detection System with Optimized DS Evidence Theory
Published 2014-01-01“…Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
Get full text
Article -
3910
Object Detection Techniques in Autonomous Driving
Published 2025-01-01“…The review emphasizes the importance of developing more robust and adaptive models, and it outlines future directions such as enhancing sensor fusion methods, optimizing model architectures, and employing open-world learning to prepare for unexpected scenarios, ultimately aiming to improve the reliability and safety of autonomous driving technologies.…”
Get full text
Article -
3911
A Rare Occurrence of Bilateral Single-Rooted Mandibular First Molar
Published 2022-01-01“…There are few studies related to a lower number of roots and root canals, but the occurrence of bilateral mandibular first and second molars with the presence of root fusion resulting in a single root is very rare. This case report presents the nonsurgical endodontic management of the left and right mandibular first molars with the presence of a single root confirmed using a CBCT and treated by placing an apical MTA plug followed by backfill using thermoplasticised gutta percha.…”
Get full text
Article -
3912
Radar Selection Method Based on an Improved Information Filter in the LPI Radar Network
Published 2018-01-01“…Finally, the weight parameters for the tracking fusion are designed after the error covariance prediction of every working radar, in order to improve the IMM-IF. …”
Get full text
Article -
3913
A Wideband Hybrid Fractal Ring Antenna for WLAN Applications
Published 2022-01-01“…This hybrid geometry is a fusion of meander and Koch curve shapes. The geometrical construction of the proposed antenna is compared to the standard Koch curve geometry. …”
Get full text
Article -
3914
A survey on Wi-Fi signal based identification technology
Published 2021-12-01“…With the constant progress of the information technology, the research on identification is developing towards unawareness and automation, and applied widely in many fields, such as human-computer interaction, smart home and intelligent security.As a non-contact wireless sensing technology, Wi-Fi signal based identification is progressively evolving towards the directions of multi-attribute identification and legality verification.Firstly, the principle of wireless signal-based identification was introduced, and reviews pretreatment processes from the viewpoint of signal processing were reviewed.Then, identification implementation was discussed from two different bases of walking and daily activities.Two major development trends of identification which were multi-attribute identification and legality verification were discussed from function evolution’s views.Finally, the multiple research areas were indicated including hyper-level feature extraction, daily activities’ analysis, identification model construction, and multi-technology fusion as future directions of realizing more robust, diversify and universal identification, which would provide the important support for the research and development of Internet of things perception layer.…”
Get full text
Article -
3915
Delayed Hypersensitivity Reaction: An Increasingly Recognized Complication of Metal-on-Metal Total Disc Replacement
Published 2015-01-01“…The prosthesis has been removed and a fusion achieved using a cage filled with bone graft. …”
Get full text
Article -
3916
Review on Fault Diagnosis Technology for High-speed EMU Gearboxes
Published 2023-03-01“…The single diagnosis technology can not accurately diagnose the multi-type failures of the gearbox due to its limitations, and the fusion of multiple techniques based on advanced intelligent algorithms is expected to be one of the research focuses for fault diagnosis in this field in the future.…”
Get full text
Article -
3917
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01“…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
Get full text
Article -
3918
Application of Full Vector Deep Learning in Bearing Fault Diagnosis
Published 2019-01-01“…Firstly,full vector spectrum is used to fuze the binary channel signal,the main vibration vector data after full vector fusion is acquired,the disadvantage of incomplete single channel vibration signal is overcome. …”
Get full text
Article -
3919
Research on traffic identification and scheduling based on optical interconnection architecture in data center
Published 2018-09-01“…In order to solve the data center link congestion problem,based on the characteristics of the flow distribution and flow types,a flow identification and scheduling scheme based on optical interconnect structure,named HCFD (host-controller flow detection),was proposed to identify the elephant flow which has a large impact on the network performance,and use the SDN controller to make forward strategy,and schedule the network traffic reasonably.The implementation of the scheme was to use the Netfilter framework in Linux kernel protocol on the host side to mark the flow that exceeds the threshold amount.Then,the classification model was used in the controller side to classify the marked flow.Finally,the appropriate forwarding strategy was developed based on the above results.With the advantage of the photoelectric network,mechanisms of flow depth fusion and switching could be realized.The scheme which integrates the advantage of the existing research results,was expected to identify elephant flow more accurately and comprehensively.It can effectively alleviate the network congestion,make full use of network bandwidth,reduce end-to-end delay and packet loss rate.…”
Get full text
Article -
3920
Design of a mass-customization-based cost-effective Internet of Things sensor system in smart building spaces
Published 2016-08-01“…In the coming Internet of Things era, billions of users and devices will be connected to the Internet; this will lead beyond the era of super-connection to the era of super-fusion. In this era, it is more important than ever to design a highly scalable Internet of Things infrastructure by mass customization for cost-effective production of exponentially increasing numbers of Internet of Things systems to provide more intelligent service in smart spaces. …”
Get full text
Article