-
381
Density-Based Detection Rapid Exploration Random Tree for Multirobot Formation Cooperative Path Planning
Published 2025-03-01“…Second, the repulsion field function in the artificial potential field (APF) is optimized for local collaborative obstacle avoidance to enable multiple robots, and a rotational potential field is introduced to solve the problems of unreachable targets and local oscillations. …”
Get full text
Article -
382
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…Almost 85% of companies polled said they were looking into anomaly detection (AD) technologies for their industrial image anomalies. …”
Get full text
Article -
383
Enhancing Real-Time Road Object Detection: The RD-YOLO Algorithm With Higher Precision and Efficiency
Published 2024-01-01“…Second, we design a high-resolution detection branch to enhance the accuracy of small-scale object detection. …”
Get full text
Article -
384
Towards Efficient SAR Ship Detection: Multi-Level Feature Fusion and Lightweight Network Design
Published 2025-07-01“…Thus, guided by the principles of lightweight design, robustness, and energy efficiency optimization, this study proposes a three-stage collaborative multi-level feature fusion framework to reduce model complexity without compromising detection performance. …”
Get full text
Article -
385
-
386
Detection of Aflatoxigenic Fungi in Dairy Cattle Feed: Findings From Urban Districts of Tigray, Ethiopia
Published 2025-05-01Get full text
Article -
387
YOLO-UIR: A Lightweight and Accurate Infrared Object Detection Network Using UAV Platforms
Published 2025-07-01Get full text
Article -
388
Robustness Benchmark Evaluation and Optimization for Real-Time Vehicle Detection Under Multiple Adverse Conditions
Published 2025-04-01“…This paper presents a robustness benchmark evaluation and optimization for vehicle detection. Real-time vehicle detection has become an essential means of data perception in the transportation field, covering various aspects such as intelligent transportation systems, video surveillance, and autonomous driving. …”
Get full text
Article -
389
Machine Learning-Based Intrusion Detection Systems for the Internet of Drones: A Systematic Literature Review
Published 2025-01-01“…This infrastructure enables seamless real-time data exchange and collaborative operations across diverse applications, ranging from surveillance to delivery services, while ensuring adaptability, scalability, and security in dynamic aerial environments. …”
Get full text
Article -
390
Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region
Published 2025-02-01“…In the model compression phase, the proposed FCW-YOLO model undergoes channel-level sparsity through a collaborative pruning algorithm, automatically identifying unimportant channels and reducing them, resulting in the FCWP-YOLO model, achieving secondary lightweight design of the coal mine pedestrian-vehicle detection model. …”
Get full text
Article -
391
Research and practice on technologies for full stack deployment of autonomous networks
Published 2023-08-01“…Autonomous networks achieve network self management, self optimization, and self repair by building intelligent network infrastructure.Autonomous network was divided into two key stages: AI model building and AI model deployment.However, the industry paid less attention to AI model deployment.The deployment phase of autonomous networks was systematically studied.Firstly, it elaborated on the independent deployment mode and full stack deployment mode of autonomous networks, and pointed out that full stack deployment was the main direction.Secondly, a detailed introduction was given to the full stack architecture with “five layers, dual domains, and four closed-loops”, which achieved full life cycle intelligence through a layered closed-loop design of resources and processes.Then, three core technologies for independent innovation were proposed: AI model training and inference integration to achieve rapid iterative updates of models, AI fabric technology to achieve customized application by rapid construction, and AI model cloud-edge collaborative deployment technology to achieve efficient application.Finally, the effectiveness of these three core technologies was verified through cases such as anomaly detection, smart telecommunication rooms, and equipment inspections.The deployment of autonomous networks was systematically explored, especially in terms of architecture design and core technology innovation, which had important reference value for telecommunication operators’ network digital transformation.…”
Get full text
Article -
392
-
393
-
394
Exploring Generative AI for YOLO-Based Object Detection to Enhance Flood Disaster Response in Malaysia
Published 2024-01-01Get full text
Article -
395
Practical Implementation of Federated Learning for Detecting Backdoor Attacks in a Next-word Prediction Model
Published 2025-01-01“…Abstract This article details the development of a next-word prediction model utilizing federated learning and introduces a mechanism for detecting backdoor attacks. Federated learning enables multiple devices to collaboratively train a shared model while retaining data locally. …”
Get full text
Article -
396
Enhancing Brain Tumor Detection Through Custom Convolutional Neural Networks and Interpretability-Driven Analysis
Published 2024-10-01“…Furthermore, interpretability was enhanced through gradient-based attribution methods and saliency maps, providing valuable insights into the model’s decision-making process and fostering collaboration between AI systems and clinicians. This approach contributes a highly accurate and interpretable framework for brain tumor detection, with the potential to significantly enhance diagnostic accuracy and personalized treatment planning in neuro-oncology.…”
Get full text
Article -
397
AI Enabled Threat Detection: Leveraging Artificial Intelligence for Advanced Security and Cyber Threat Mitigation
Published 2024-01-01“…This comprehensive review examines the role of artificial intelligence (AI) in enhancing threat detection and cybersecurity, focusing on recent advancements and ongoing challenges in this dynamic field. …”
Get full text
Article -
398
Securing the internet of things: A comprehensive review of ransomware attacks, detection, countermeasures, and future prospects
Published 2025-06-01“…Looking ahead, our study highlights potential research directions such as advancing real-time detection, leveraging blockchain for enhanced security and fostering cross-sector collaboration to bolster collective threat intelligence. …”
Get full text
Article -
399
Artificial Intelligence in Rotator Cuff Tear Detection: A Systematic Review of MRI-Based Models
Published 2025-05-01Get full text
Article -
400
Strengthening Outbreak Detection in Africa to Achieve the 7-1-7 Global Framework: Challenges and Opportunities
Published 2025-08-01“…Field examples from Uganda, Senegal, and Nigeria demonstrate improved timeliness where coordinated investments and multisectoral collaboration have been implemented.ConclusionMeeting the 7-1-7 detection target requires integrated, country-owned strategies that align diagnostics, surveillance, workforce, and governance within resilient national health security frameworks, underpinned by sustained domestic investment.…”
Get full text
Article