-
2281
MACA-Net: Mamba-Driven Adaptive Cross-Layer Attention Network for Multi-Behavior Recognition in Group-Housed Pigs
Published 2025-04-01“…Additionally, an Adaptive Multi-Path Attention (AMPA) mechanism integrates spatial-channel attention to enhance feature focus, ensuring robust performance in complex environments and low-light conditions. To further improve detection, a Cross-Layer Feature Pyramid Transformer (CFPT) neck employs non-upsampled feature fusion, mitigating semantic gap issues where small target features are overshadowed by large target features during feature transmission. …”
Get full text
Article -
2282
Research on Calf Behavior Recognition Based on Improved Lightweight YOLOv8 in Farming Scenarios
Published 2025-03-01“…A calf daily behavior dataset containing 2918 images is selected as the test benchmark through video frame extraction; a P2 small-target detection layer is introduced to improve the resolution of the input scene, which significantly improves the model recognition accuracy, and reduces the computational complexity and storage requirements of the model through the Lamp pruning method. …”
Get full text
Article -
2283
Towards precision diagnosis: a novel hybrid DC-CAD model for lung disease detection leveraging multi-scale capsule networks and temporal dynamics
Published 2025-05-01“…Abstract The early detection of lung diseases, including cancer, is essential for improving patient outcomes. …”
Get full text
Article -
2284
Enhancing Autonomous Truck Navigation in Underground Mines: A Review of 3D Object Detection Systems, Challenges, and Future Trends
Published 2025-06-01“…Integrating autonomous haulage systems into underground mining has revolutionized safety and operational efficiency. However, deploying 3D detection systems for autonomous truck navigation in such an environment faces persistent challenges due to dust, occlusion, complex terrains, and low visibility. …”
Get full text
Article -
2285
Highly efficient CRISPR/Cas9-RNP mediated CaPAD1 editing in protoplasts of three pepper (Capsicum annuum L.) cultivars
Published 2024-12-01“…We selected two sgRNAs, sgRNA2 and sgRNA5, which had high in vivo target efficiencies for the CaPAD1 gene across the three cultivars and were validated as potential off-targets in their genomes. …”
Get full text
Article -
2286
Empirical analysis of control models for different converter topologies from a statistical perspective
Published 2025-01-01“…Converter topologies including SEPIC, ZETA, etc. are controlled via selection of capacitive and inductive components, which assists in improving its conversion efficiency for different type of loads. …”
Get full text
Article -
2287
Underwater Magnetic Sensors Network
Published 2025-04-01“…This study explores the design and performance of an underwater magnetic sensor network (UMSN) tailored for intrusion detection in complex environments such as riverbeds and areas with dense vegetation. …”
Get full text
Article -
2288
A Scalable Framework for Real-Time Network Security Traffic Analysis and Attack Detection Using Machine and Deep Learning
Published 2025-04-01“…This paper presents an advanced framework for real-time monitoring and analysis of network traffic and endpoint security in large-scale enterprises by addressing the increasing complexity and frequency of cyber-attacks. Our Network Security Traffic Analysis Platform employs a comprehensive technology stack including the Elastic Stack, ZEEK, Osquery, Kafka, and GeoLocation data. …”
Get full text
Article -
2289
FED-GEM-CN: A federated dual-CNN architecture with contrastive cross-attention for maritime radar intrusion detection
Published 2025-09-01“…These findings substantiate the efficacy of the proposed system in delivering robust, energy-efficient, and privacy-aware intrusion detection tailored to the constraints of maritime radar networks. …”
Get full text
Article -
2290
PerMSCA-YOLO: A Perceptual Multi-Scale Convolutional Attention Enhanced YOLOv8 Model for Rail Defect Detection
Published 2025-03-01“…The innovative contribution of this research lies in its effective strategy for improving detection accuracy and real-time performance through multi-scale feature fusion and deep semantic alignment mechanisms, providing a solution that balances both precision and efficiency for defect detection in complex track environments, with substantial engineering application potential.…”
Get full text
Article -
2291
SMS Scam Detection Application Based on Optical Character Recognition for Image Data Using Unsupervised and Deep Semi-Supervised Learning
Published 2024-09-01“…The rationale behind highlighting these models is their potential to significantly improve smishing detection rates. For instance, the high accuracy of the KNN-Flatten model suggests its applicability in real-time spam detection systems, but its computational complexity might limit scalability in large-scale deployments. …”
Get full text
Article -
2292
Energy Distribution Optimization in Heterogeneous Networks with Min–Max and Local Constraints as Support of Ambient Intelligence
Published 2025-04-01“…The approach centers on selecting the most appropriate communication protocols, such as Wi-Fi, Bluetooth, or 5G, to connect devices. …”
Get full text
Article -
2293
Enhanced the Trans‐Cleavage Activity of CRISPR‐Cas12a Using Metal‐Organic Frameworks as Stimulants for Efficient Electrochemical Sensing of Circulating Tumor DNA
Published 2025-06-01“…Herein, an electrochemical biosensor based on manganese metal‐organic frameworks (MOFs)‐enhanced CRISPR (MME‐CRISPR) is proposed that enables the efficient detection of circulating tumor DNA (ctDNA). …”
Get full text
Article -
2294
Optimal Planning of Wind-Based DG: A Two-Stage Approach Linking Penetration Factor, Turbine Type Selection, Capacity, and Power Factors to Minimize Line Losses
Published 2025-01-01“…By aligning turbine type selection with the available wind resources at the site, the model maximizes energy production and operational efficiency. …”
Get full text
Article -
2295
-
2296
Design Improvement of Permanent Magnet Motor Using Single- and Multi-Objective Approaches
Published 2024-01-01“…Engineers and academics have been actively involved in optimising these systems to achieve better performance, efficiency, and cost-effectiveness. Optimising electrical machines, including permanent magnet motors, is a complex task. …”
Get full text
Article -
2297
An echo state network based on enhanced intersecting cortical model for discrete chaotic system prediction
Published 2025-07-01“…This approach of modifying neuron-level complexity, rather than network-level architecture, presents a potential direction for the design of future reservoir computing models for complex systems.…”
Get full text
Article -
2298
Performance analysis of high-rate generalized space code index modulation system
Published 2025-01-01“…The traditional modulation symbols were replaced with the additional phase by the HR-GS-CIM system, and the genetic algorithm (GA) was used to optimize the design of the additional phase, which could acquire high energy efficiency advantage and performance advantage. At the same time, the methods of generalized and spatial indexing were introduced to jointly map select the additional phase, spreading code, and antenna lead, and a low-complexity joint mapping selection algorithm was adopted to greatly improve the system’s spectral efficiency. …”
Get full text
Article -
2299
Individual Tree Segmentation Based on Region-Growing and Density-Guided Canopy 3-D Morphology Detection Using UAV LiDAR Data
Published 2025-01-01“…Next, the height and density information are combined to guide the selection of vertical profiles. Finally, a 3-D morphological detection is conducted on the profiles to extract the potential trees. …”
Get full text
Article -
2300
BlockDroid: detection of Android malware from images using lightweight convolutional neural network models with ensemble learning and blockchain for mobile devices
Published 2025-05-01“…Because these methods can automatically extract meaningful features from data and efficiently learn complex relationships, they can achieve better performance in malware detection as well as in solving many other problems. …”
Get full text
Article