-
301
An insulator target detection algorithm based on improved YOLOv5
Published 2025-01-01“…Abstract Drone inspections are widely utilized in the detection of insulators in power lines. To address issues with traditional object detection algorithms, such as large parameter counts, low detection accuracy, and high miss rates, this paper proposes an insulator detection algorithm based on an improved YOLOv5 model. …”
Get full text
Article -
302
River floating object detection with transformer model in real time
Published 2025-03-01“…Abstract The DEtection TRansformer (DETR) and the YOLO series have been at the forefront of advancements in object detection. …”
Get full text
Article -
303
Field Obstacle Detection and Location Method Based on Binocular Vision
Published 2024-09-01“…Additionally, the use of a Poly Kernel Inception (PKI) Block reduces model size while improving obstacle detection across various scales. …”
Get full text
Article -
304
Improved Field Obstacle Detection Algorithm Based on YOLOv8
Published 2024-12-01“…First, to adapt to different tasks and complex environments in the field, improve the sensitivity of the detector to various target sizes and positions, and enhance detection accuracy, the CBAM (Convolutional Block Attention Module) was integrated into the backbone layer of the benchmark model. …”
Get full text
Article -
305
Lightweight highland barley detection based on improved YOLOv5
Published 2025-03-01“…However, challenges such as overlapping spikes in unmanned aerial vehicle (UAV) images and the computational requirements for high-resolution image analysis hinder real-time detection capabilities. To address these issues, this study proposes an improved lightweight YOLOv5 model for highland barley spike detection. …”
Get full text
Article -
306
THANTD: Triplet Hybrid Attention Network for Hyperspectral Target Detection
Published 2025-01-01“…Hyperspectral images (HSIs), characterized by their rich spatial–spectral information, have been widely utilized in hyperspectral target detection (HTD), a key area within hyperspectral remote sensing information processing. …”
Get full text
Article -
307
Optimized Microfluidic Biosensor for Sensitive C-Reactive Protein Detection
Published 2025-03-01“…This approach minimizes the non-specific binding of conjugated antibodies to unwanted areas of the NC pad, eliminating the need to block those areas, which enhances the sensitivity of detection. …”
Get full text
Article -
308
Aortic Aneurysm Inflammatory Cell Detection with Deep Learning methods
Published 2025-01-01Get full text
Article -
309
Optimizing Monkeypox Lesions Detection With a Lightweight Hybrid Model
Published 2025-01-01Get full text
Article -
310
Field Measurement and Mechanical Analysis of Height of the Water Flowing Fracture Zone in Short-Wall Block Backfill Mining beneath the Aquifer: A Case Study in China
Published 2018-01-01“…Short-wall block filling mining (SBBM) technology has become an effective way to recover coal resources beneath the aquifer, which are unsuitable, or cannot be used by long-wall mining, such as corner coal pillars, industrial square pillars, and irregular coal blocks as well as the coal beneath buildings, railways, and water bodies. …”
Get full text
Article -
311
BFER-Net: Babies Facial Expression Recognition Model Using ResNet12 Enabled Few-Shot Embedding Adaptation and Convolutional Block Attention Modules
Published 2025-01-01“…Here, we have deployed the feature extraction process. A Convolutional Block Attention Module (CBAM) was integrated into the Modified ResNet12 architecture. …”
Get full text
Article -
312
Allergen-Specific IgG Antibodies Purified from Mite-Allergic Patients Sera Block the IgE Recognition of Dermatophagoides pteronyssinus Antigens: An In Vitro Study
Published 2013-01-01“…One of the purposes of specific immunotherapy (SIT) is to modulate humoral immune response against allergens with significant increases in allergen-specific IgG levels, commonly associated with blocking activity. The present study investigated in vitro blocking activity of allergen-specific IgG antibodies on IgE reactivity to Dermatophagoides pteronyssinus (Dpt) in sera from atopic patients. …”
Get full text
Article -
313
Preoperative Analgesia Efficacy of Liposomal Bupivacaine Following Pericapsular Nerve Group (PENG) Block in Patients with Hip Fracture: A Randomized Controlled Observer-Blinded Stu...
Published 2024-12-01“…No significant inter-group differences were detected in other secondary outcomes. Conclusions For preoperative analgesia of hip fractures, LB single-injection PENG block had a similar analgesic intensity and safety as ropivacaine but provided a longer duration of analgesia, reaching 48 h and even extending beyond 60 h, which reduced opioid consumption and extended time to the first opioid. …”
Get full text
Article -
314
SFSCDNet: A Deep Learning Model With Spatial Flow-Based Semantic Change Detection From Bi-Temporal Satellite Images
Published 2024-01-01“…The Attention-Based Siamese Encoder, Cascaded Convolutional Attention Fusion Block, Cascaded Convolutional Attention Refinement Block and Differentiable Binarization layer helps in improving semantic change detection performance. …”
Get full text
Article -
315
Physical-social attributes integrated Sybil detection for Tor bridge distribution
Published 2023-02-01“…As one of the most widely utilized censorship circumvention systems, Tor faces serious Sybil attacks in bridge distribution.Censors with rich network and human resources usually deploy a large number of Sybils, which disguise themselves as normal nodes to obtain bridges information and block them.In the process, due to the different identities, purposes and intentions of Sybils and normal nodes, individual or group behavior differences occur in network activities, called as node behavior characteristics.To handle the Sybil attacks threat, a Sybil detection mechanism integrating physical-social attributes was proposed based on the analysis of node behavior characteristics.The physical-social attributes evaluation methods were designed.The credit value of nodes objectively reflecting the operation status of bridges on the nodes and the suspicion index of nodes reflecting the blocking status of bridges, were utilized to evaluate the physical attributes of nodes.The social attributes of nodes were evaluated by the social similarity, which described the static attribute labels of nodes and their social trust characterizing the dynamic interaction behaviors of nodes.Furthermore, integrating the physical-social attributes, the credibility of nodes were defined as the possibility of the current node being a Sybil, which was exploited as a guidance on inferring the true identifies of nodes, so as to achieve accurate detection on Sybils.The detection performance of the proposed mechanism based on the constructed Tor network operation status simulator and the Microblog PCU dataset were simulated.The results show that the proposed mechanism can effectively improve the true positive rate on Sybils, and decrease the false positive rate.It also has stronger resistance on the deceptive behavior of censors, and still performs well in the absence of node social attributes.…”
Get full text
Article -
316
Function encoding based approach for App clone detection in cloud environment
Published 2019-08-01“…An efficient function-based encoding scheme in the cloud environment for detecting the cloned Apps was designed,called Pentagon.Firstly,a basic block feature extraction method was proposed.Secondly,a monotonic encoding algorithm for the App function was designed,which encoded the function based on the control flow graph structure and basic block attributes.Finally,a three-party libraries filtering method was proposed by using an efficient clustering algorithm based on the function feature.Experiments verified the effectiveness of the proposed scheme.The average search time is close to 79 ms,and the clone detection accuracy achieves 97.6%.…”
Get full text
Article -
317
A method for synthetic speech detection using local phase quantization
Published 2024-02-01“…Due to the convenience of speech synthesis, synthesized disguised speech poses a great threat to the security of speaker verification systems.In order to further enhance the ability of detecting the camouflage to the speaker verification system, a method of synthetic speech detection was put forward using the information in spectral domain of the synthetic speech spectrogram.The method employed the local phase quantization (LPQ) algorithm to describe frequency domain information in the speech spectrogram.Firstly, the spectrogram was divided into several sub-blocks, and then the LPQ was performed on each sub-block.After the histogram statistical analysis, the LPQ feature vector was obtained and used as the input feature of the random forest classifier to realize the synthetic speech detection.The experimental results demonstrate that the proposed method further reduces tandem detection cost function (t-DCF) and has better generalization ability.…”
Get full text
Article -
318
Fuzzy deep learning architecture for cucumber plant disease detection and classification
Published 2025-05-01“…The proposed architecture incorporates 40 convolutional layers, 4 pooling layers, 4 inverted bottleneck blocks, 4 bottleneck blocks, 5 fuzzy layers, and a fully connected layer designed to enhance accuracy and stability when analyzing remotely sensed data. …”
Get full text
Article -
319
Detection of latent brain states from spontaneous neural activity in the amygdala.
Published 2025-02-01“…Indeed, the spontaneous firing rates of neurons in the amygdala are different during blocks of gentle grooming touches delivered by a trusted social partner, and during blocks of non-social airflow stimuli delivered by a computer-controlled air valve. …”
Get full text
Article -
320
Detection of human activities using multi-layer convolutional neural network
Published 2025-02-01Get full text
Article