-
861
LiDAR-Based Detection of Urban Trees Using a Backpack System
Published 2025-07-01“…The sensor’s effective range is up to 50 m (at 80% reflectivity), enabling the acquisition of high-density point clouds at close-range distances while maintaining efficiency and accessibility in complex urban environments. …”
Get full text
Article -
862
RT-DETR-Smoke: A Real-Time Transformer for Forest Smoke Detection
Published 2025-04-01“…Unlike generic object detection, smoke detection faces unique challenges due to smoke’s semitransparent, fluid nature, which often leads to false positives in complex backgrounds and missed detections—particularly around smoke edges and small targets. …”
Get full text
Article -
863
Remote Sensing Image Detection Method Combining Dynamic Convolution and Attention Mechanism
Published 2025-01-01“…Compared with existing detection methods, this approach shows outstanding performance in detection accuracy, localization precision, and computational efficiency, particularly excelling in small object detection.…”
Get full text
Article -
864
An Image-Free Single-Pixel Detection System for Adaptive Multi-Target Tracking
Published 2025-06-01“…Conventional vision-based sensors face limitations such as low update rates, restricted applicability, and insufficient robustness in dynamic environments with complex object motions. Single-pixel tracking systems offer high efficiency and minimal data redundancy by directly acquiring target positions without full-image reconstruction. …”
Get full text
Article -
865
A parallel algorithm for network traffic anomaly detection based on Isolation Forest
Published 2018-11-01“…With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data generated is increasing tremendously, and efficient anomaly detection on those massive network traffic data is crucial to many network applications, such as malware detection, load balancing, network intrusion detection. …”
Get full text
Article -
866
SGSNet: a lightweight deep learning model for strawberry growth stage detection
Published 2024-12-01“…However, dense planting patterns and complex environments within greenhouses present challenges for accurately detecting growth stages. …”
Get full text
Article -
867
Research on detection of wheat tillers in natural environment based on YOLOv8-MRF
Published 2025-03-01“…To bolster agricultural efficiency and precision, this study introduces the YOLOv8-MRF model (multi-path coordinate attention, receptive field attention convolution, and Focaler-CIoU-optimized YOLOv8), a groundbreaking advancement in automated detection of wheat tillers. …”
Get full text
Article -
868
CIDNet: A Maritime Ship Detection Model Based on ISAR Remote Sensing
Published 2025-05-01“…The model is based on the Boundary Box Efficient Transformer (BETR) architecture, which combines super-resolution preprocessing, a deep feature extraction network, a feature fusion technique, and a coordinate maintenance mechanism to improve the detection accuracy and real-time performance of ship targets in complex settings. …”
Get full text
Article -
869
A Multi-Domain Feature Fusion CNN for Myocardial Infarction Detection and Localization
Published 2025-06-01Get full text
Article -
870
Double-layer membrane framework-based gold microelectrode for determination of natural labile copper in complex water environments
Published 2025-03-01“…However, the determination of low concentration labile Cu (CuLabile) in complex water environments remains a huge challenge. …”
Get full text
Article -
871
YOLO-SRSA: An Improved YOLOv7 Network for the Abnormal Detection of Power Equipment
Published 2025-05-01“…Existing models have high false and missed detection rates in complex weather and multi-scale equipment scenarios. …”
Get full text
Article -
872
An image processing technique for optimizing industrial defect detection using dehazing algorithms.
Published 2025-01-01“…In recent years, the demand for efficient and accurate defect detection algorithms in industrial production has been increasing. …”
Get full text
Article -
873
Complex PM2.5 Pollution and Hospital Admission for Respiratory Diseases over Big Data in Cloud Environment
Published 2020-01-01“…Cloud computing may be an efficient and low-cost way to solve this problem. This paper investigates a problem of a complex system: the impact of PM2.5 on hospitalization for respiratory diseases. …”
Get full text
Article -
874
Image-Based Malicious Network Traffic Detection Framework: Data-Centric Approach
Published 2025-06-01“…This often leads to increased computational overhead and heightened complexity in detection models, potentially degrading overall system performance and efficiency. …”
Get full text
Article -
875
AN ITERATIVE ALGORITHM OF OBJECT DETECTION IN VIDEO SEQUENCE BASED ON HISTOGRAM SPATIAL MEASURES
Published 2019-06-01“…The parameters of algorithm are defined in terms of detection efficiency and computational complexity.…”
Get full text
Article -
876
An Anomaly Detection Method for Industrial System Cybersecurity Based on GGL-WAVE-CNN
Published 2025-07-01“…Current approaches often struggle to handle complex, unknown topological time series data, thereby necessitating improved anomaly detection accuracy. …”
Get full text
Article -
877
Automatic detection of foreign object intrusion along railway tracks based on MACENet.
Published 2025-01-01“…Ensuring high accuracy and efficiency in foreign object intrusion detection along railway lines is critical for guaranteeing railway operational safety under limited resource conditions. …”
Get full text
Article -
878
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01“…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
Get full text
Article -
879
Study of conveyor belt deviation detection based on improved YOLOv8 algorithm
Published 2024-11-01“…Abstract Conveyor belt deviation is a commmon and severe type of fault in belt conveyor systems, often resulting in significant economic losses and potential environment pollution. Traditional detection methods have obvious limitations in fault localization precision and analysis accuracy, unable to meet the demands of efficient and real-time fault detection in complex industrial scenarios. …”
Get full text
Article -
880
Deep Reinforcement Learning-Based Motion Control Optimization for Defect Detection System
Published 2025-04-01“…For practical implementation and validation, a PMSM simulation model is constructed in MATLAB/Simulink, serving as an interactive training platform for the DRL agent and facilitating efficient, robust training. The simulation results validate the effectiveness and superiority of the proposed optimization strategy, demonstrating its applicability and potential for precise and robust control in complex nonlinear defect detection systems.…”
Get full text
Article