Suggested Topics within your search.
Suggested Topics within your search.
-
2641
DAHD-YOLO: A New High Robustness and Real-Time Method for Smoking Detection
Published 2025-02-01“…We introduce the ECA-FPN, an improved version of the feature pyramid network, designed to refine the extraction of hierarchical information and enhance cross-scale feature interactions. …”
Get full text
Article -
2642
Using near-infrared spectroscopy to estimate soil water retention curves with the van Genuchten model
Published 2025-02-01Get full text
Article -
2643
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
Get full text
Article -
2644
CF-YOLO for small target detection in drone imagery based on YOLOv11 algorithm
Published 2025-05-01“…Firstly, addressing the issue of small target information loss that may arise from hierarchical convolutional structures, we conduct in-depth research on the Path Aggregation Network (PAN) and innovatively propose a Cross-Scale Feature Pyramid Network (CS-FPN). Secondly, to overcome the problems of positional information deviation and feature redundancy during multi-scale feature fusion, we design a Feature Recalibration Module (FRM) and a Sandwich Fusion Module. …”
Get full text
Article -
2645
Deep Learning Algorithm for Optimized Sensor Data Fusion in Fault Diagnosis and Tolerance
Published 2024-12-01“…Here, the major objective is to locate problems in detection by analysing previous data or sequential patterns of data that cause failure. …”
Get full text
Article -
2646
Speech emotion recognition algorithm of intelligent robot based on ACO-SVM
Published 2025-12-01“…In the feature selection stage, ACO algorithm is introduced to explore the optimal combination of emotion features, aiming at improving the efficiency and robustness of emotion recognition. …”
Get full text
Article -
2647
Psychological Network Analysis for Risk and Protective Factors of Problematic Social Media Use
Published 2025-07-01Get full text
Article -
2648
A Temporal-Spectral Fused and Attention-Based Deep Model for Automatic Sleep Staging
Published 2023-01-01“…The TSA-Net is composed of a two-stream feature extractor, feature context learning, and conditional random field (CRF). …”
Get full text
Article -
2649
Positive solutions to a coupled singular anisotropic system with nonstandard growth and singular nonlinearities
Published 2025-06-01“…By employing variational methods and an approximation problem, we prove the existence of positive solutions under suitable conditions on the nonlinearities.…”
Get full text
Article -
2650
Spark: The First Choice for Novices
Published 2024-12-01“…Setting itself apart from its counterparts, Spark boasts an innovative formal language and a rich set of features. Unlike traditional platforms, Spark emphasizes computational problem solving over programming syntax, making it accessible to learners of all levels. …”
Get full text
Article -
2651
Optimizing PHEV Routing with Hybrid Mode and Partial Charging via Labeling-Based Methods
Published 2025-06-01“…This study investigates a variant of the shortest path problem (SPP) tailored for plug-in hybrid electric vehicles (PHEVs), incorporating two practical features: hybrid energy mode switching and partial charging. …”
Get full text
Article -
2652
-
2653
-
2654
A multi objective collaborative reinforcement learning algorithm for flexible job shop scheduling
Published 2025-07-01“…First, a mathematical model for flexible job shop scheduling optimization is established, with the makespan and total energy consumption of the shop as optimization objectives, and a disjunctive-graph is introduced to represent state features. Second, two intelligent agents are designed to address the simultaneous decision making problems of jobs and machines. …”
Get full text
Article -
2655
THE EFFICIENCY IMPROVING OF PILOTS AND CADETS TRAINING TO SAFETY CONTROL USING THE MODIFICATIONS OF CLASSICAL METHOD OF "ROY" (PSO)
Published 2017-11-01“…The increased accuracy and the introduction of additional variables in the optimization problem of security is solved based on the methodology PSO. …”
Get full text
Article -
2656
Multiperiod Location–Allocation Optimization of Construction Logistics Centers for Large-Scale Projects in Complex Environmental Regions
Published 2025-03-01“…However, the CLC location–allocation problem, which considers periodic demand and transportation risk, has not been adequately solved. …”
Get full text
Article -
2657
Introducing the ethical cycle model for resolving ethical conflicts in medical practice: addressing challenges in treating pandemic patients
Published 2024-12-01“… Ethical dilemmas are among the most important ethical problems in medicine. With the advent of COVID-19, the moral problems of physicians have taken on new dimensions as the specific features of this disease pose additional ethical challenges that require particular solutions. …”
Get full text
Article -
2658
A Dual-Branch Network for Intra-Class Diversity Extraction in Panchromatic and Multispectral Classification
Published 2025-06-01Get full text
Article -
2659
-
2660
Cryptographic hardness assumptions identification based on discrete wavelet transform
Published 2025-06-01“…Based on these wavelets, a feature extraction method is designed to extract features from both ciphertexts and digital signatures. …”
Get full text
Article