-
1121
YOLO-WAS: A Lightweight Apple Target Detection Method Based on Improved YOLO11
Published 2025-07-01“…To overcome the limitations of existing apple target detection methods, including low recognition accuracy of multi-species apples in complex orchard environments and a complex network architecture that occupies large memory, a lightweight apple recognition model based on the improved YOLO11 model was proposed, named YOLO-WAS model. …”
Get full text
Article -
1122
Towards precision agriculture tea leaf disease detection using CNNs and image processing
Published 2025-05-01“…Our model’s architecture is not just a testament to the sophistication of modern deep learning techniques but also highlights the novelty of applying such complex structures to the challenges of agricultural disease detection. …”
Get full text
Article -
1123
Target detection of helicopter electric power inspection based on the feature embedding convolution model.
Published 2024-01-01“…In addition, this study further optimizes the model with reinforcement learning technology, conducts a comparative analysis of different flight environments and facilities, and reveals the diversity and complexity of inspection objectives. The performance of the optimized model in fault detection is increased by more than 36%. …”
Get full text
Article -
1124
A lightweight model for echo trace detection in echograms based on improved YOLOv8
Published 2024-12-01“…However, current detection models are too parameter-heavy to embed in echosounders and struggle with noisy, irregular, and dense echograms. …”
Get full text
Article -
1125
YOLOv8-LSW: A Lightweight Bitter Melon Leaf Disease Detection Model
Published 2025-06-01“…Bitter melon, an important medicinal and edible economic crop, is often threatened by diseases such as downy mildew, powdery mildew, viral diseases, anthracnose, and blight during its growth. Efficient and accurate disease detection is of significant importance for achieving sustainable disease management in bitter melon cultivation. …”
Get full text
Article -
1126
Research on anomaly detection model for traffic time series data integrating multiple mechanisms
Published 2025-06-01“…The results show that adding each module on the basis of LSTM significantly improves the model's prediction and anomaly detection ability; Compared with the general hybrid model Transformer-Bi-LSTM, the proposed model has stronger prediction ability and lower computational complexity. …”
Get full text
Article -
1127
Strategic Spatial Segregation in Silicon Photoelectrodes: Decoupling Catalytic and Optical Functions for High‐Efficiency Solar Water Splitting
Published 2025-05-01“…Furthermore, a scalable fabrication strategy is developed utilizing controlled wet etching and selective catalyst deposition, enabling precise realization of these complex architectures. This spatial segregation strategy presents a new direction for high‐efficiency PEC systems, offering broader implications for various solar energy conversion applications.…”
Get full text
Article -
1128
Use of Business Intelligence as a Strategic Information Technology in Banking: Farud Discovery & Detection
Published 2009-02-01“…It also explains how BI can be effective technology in industries like banking to overcome critical issue like fraud discovery and detection. The methodology, based on BI, in the form of model named BI model for fraud discovery and detection has been devised and suggested at the end of paper along with it its details for overcoming the above mentioned issue in more effective and efficient manner.…”
Get full text
Article -
1129
Surface anomaly detection on island-based PV panels using edge neural networks
Published 2024-12-01“…Due to the poor accuracy and low efficiency of existing detection methods, the paper proposes a surface anomaly detection method for island-based PV panels using edge neural networks. …”
Get full text
Article -
1130
Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems
Published 2024-11-01“…Conventional anomaly detection techniques often lack the ability to provide clear explanations for their detection, and their inherent complexity can impede practical implementation in the resource-constrained environments typical of ICSs. …”
Get full text
Article -
1131
Detecting command injection attacks in web applications based on novel deep learning methods
Published 2024-10-01“…Abstract Web command injection attacks pose significant security threats to web applications, leading to potential server information leakage or severe server disruption. Traditional detection methods struggle with the increasing complexity and obfuscation of these attacks, resulting in poor identification of malicious code, complicated feature extraction processes, and low detection efficiency. …”
Get full text
Article -
1132
Combination of Principal Component Analysis and Time-Frequency Representation for P-Wave Arrival Detection
Published 2019-01-01“…Due to the significant difference between the spectra of recorded seismic wave and pure noise which precedes the event, time-frequency representation allows for better accuracy of signal change detection. However, with an additional domain, the complexity rises. …”
Get full text
Article -
1133
Enhancing Software Quality with AI: A Transformer-Based Approach for Code Smell Detection
Published 2025-04-01“…In this study, we introduce Relation-Aware BERT (RABERT), a novel transformer-based model that integrates relational embeddings to enhance automated code smell detection. By modeling interdependencies among software complexity metrics, RABERT surpasses classical machine-learning methods, achieving an accuracy of 90.0% and a precision of 91.0%. …”
Get full text
Article -
1134
A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things
Published 2024-11-01“…Complex threats often go undetected by conventional security measures, requiring more sophisticated, adaptive detection methods. …”
Get full text
Article -
1135
Research on Target Detection Algorithm for Solder Joint Defects Based on the Improved YOLOv8
Published 2025-01-01“…Aiming at the problem of low accuracy in solder joint defect detection caused by the complex background and difficult to extract defect features of circuit boards using through-hole technology (THT), an improved YOLOv8 solder joint defect target detection algorithm was proposed. …”
Get full text
Article -
1136
LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Published 2025-04-01“…This research introduces a novel framework that enhances intrusion detection in IoT systems through a decentralized approach. …”
Get full text
Article -
1137
Detection and Classification of Power Quality Disturbances Based on Improved Adaptive S-Transform and Random Forest
Published 2025-08-01“…The increasing penetration of renewable energy into power systems has intensified transient power quality (PQ) disturbances, demanding efficient detection and classification methods to enable timely operational decisions. …”
Get full text
Article -
1138
YOLO-SRMX: A Lightweight Model for Real-Time Object Detection on Unmanned Aerial Vehicles
Published 2025-07-01“…YOLO-SRMX demonstrates an exceptional trade-off between detection accuracy and operational efficiency, thereby underscoring its considerable potential for efficient and precise object detection on resource-constrained UAV platforms.…”
Get full text
Article -
1139
Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Published 2025-02-01“…This study addresses the limitations of existing IoT threat detection methods, which often struggle with the dynamic nature of IoT environments and the growing complexity of cyberattacks. …”
Get full text
Article -
1140
Can YOLO Detect Retinal Pathologies? A Step Towards Automated OCT Analysis
Published 2025-07-01“…Through the advancement of technology, the volume and complexity of OCT data have rendered manual analysis infeasible, creating the need for automated means of detection. …”
Get full text
Article