-
4581
Fuzzy deep learning architecture for cucumber plant disease detection and classification
Published 2025-05-01“…At the same time, the ReLU transfer function ensures robustness, mainly when dealing with noisy or incomplete image segments. …”
Get full text
Article -
4582
Hand-aware graph convolution network for skeleton-based sign language recognition
Published 2025-01-01“…Skeleton-based sign language recognition (SLR) is a challenging research area mainly due to the fast and complex hand movement. …”
Get full text
Article -
4583
A distributed week-ahead scheduling method for the charging / discharging of plug-in electric vehicles integrated into the grid
Published 2024-01-01“…However, the existing research works on GVI are mainly limited to day-ahead or intra-day schedules which may not fully utilize the EVs' potential in charging/discharging arrangements for the power grid. …”
Get full text
Article -
4584
Detection of Access Point Spoofing in the Wi-Fi Fingerprinting Based Positioning
Published 2024-11-01“…In this paper filtering algorithms are proposed to minimize the impact of access point spoofing. …”
Get full text
Article -
4585
Enhanced Rapid Mangrove Habitat Mapping Approach to Setting Protected Areas Using Satellite Indices and Deep Learning: A Case Study of the Solomon Islands
Published 2025-07-01“…Mangroves, as a key component of the blue-carbon ecosystem, have exceptional carbon sequestration capacity and are mainly distributed in tropical coastal regions. In the Solomon Islands, ongoing degradation of mangrove forests, primarily due to land conversion and timber exploitation, highlights an urgent need for high-resolution spatial data to inform effective conservation strategies. …”
Get full text
Article -
4586
Eosinophilic Fasciitis: A Review of Research and Therapeutic Possibilities
Published 2024-12-01“…Diagnosis often involves biopsies, lab analyses, and imaging techniques. Current treatment mainly consists of corticosteroids, but further research is needed to assess various therapeutic strategies. …”
Get full text
Article -
4587
Time series forecasting of infant mortality rate in India using Bayesian ARIMA models
Published 2025-08-01“…A Random Walk Metropolis algorithm has been used to deal with analytically intractable posterior results from the ARIMA model. …”
Get full text
Article -
4588
Crack Detection Method of Sleeper Based on Cascade Convolutional Neural Network
Published 2022-01-01“…This work presents a new method for sleeper crack identification based on cascade convolutional neural network (CNN) to address the problem of low efficiency and poor accuracy in the traditional detection method of sleeper crack identification. The proposed algorithm mainly includes improved You Only Look Once version 3 (YOLOv3) and the crack recognition network, where the crack recognition network includes two modules, the crack encoder-decoder network (CEDNet) and the crack residual refinement network (CRRNet). …”
Get full text
Article -
4589
Node-Based Steady-State and Dynamic Gas Grid Calculation Method With Electrical Analogies
Published 2025-01-01“…While the steady-state electric equivalent circuit diagram of a gas pipeline mainly consists of an ohmic resistance, the transient flow characteristics also show inductive and capacitive behavior. …”
Get full text
Article -
4590
Node Classification Method Based on Hierarchical Hypergraph Neural Network
Published 2024-11-01“…The HCHG combines the high-order relationship-capturing capability of hypergraphs, uses the Louvain community detection algorithm to identify community structures within the network, and constructs hypergraphs layer by layer. …”
Get full text
Article -
4591
ML‐UrineQuant: A machine learning program for identifying and quantifying mouse urine on absorbent paper
Published 2025-03-01Get full text
Article -
4592
A Recognition Method for Adzuki Bean Rust Disease Based on Spectral Processing and Deep Learning Model
Published 2025-06-01“…Second, the competitive adaptive reweighted sampling (CARS) algorithm was implemented in the range of 425–825 nm to determine the optimal characteristic wavenumbers, thereby reducing data redundancy. …”
Get full text
Article -
4593
Diaphragm injuries in a mature trauma system: still a diagnostic challenge
Published 2024-12-01“…The majority of injuries was seen following blunt trauma (72%). Mortality was 21%, mainly due to concomitant injuries. One patient died due to the consequences of an unrecognized diaphragm injury. …”
Get full text
Article -
4594
Temporal-spatial change characteristics of sunshine duration in Tibet based on spatial interpolation technique and its influence factors
Published 2019-02-01“…Results showed that the interpolation algorithm of Kriging spherical model could simulate Tibet sunshine duration quite well. …”
Get full text
Article -
4595
Key technologies and equipment for intelligent sensor network by optical media
Published 2025-05-01“…At present, coal mine sensor network mainly adopts industrial Ethernet + fieldbus technology, which has the characteristics of differential signal transmission, collection polling and convenient application, but there are problems such as insufficient anti-interference ability, contradictory communication speed and distance, and difficult communication between nodes. …”
Get full text
Article -
4596
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
4597
Quantitative evaluation and obstacle factor diagnosis of drug regulatory capacity in China.
Published 2025-01-01“…From the perspective of obstacle factors, they were mainly in the aspects of learning development and functional performance. …”
Get full text
Article -
4598
DRR-YOLO: A Study of Small Target Multi-Modal Defect Detection for Multiple Types of Insulators Based on Large Convolution Kernel
Published 2025-01-01“…The existing insulator defect detection algorithms are mainly characterized by their ability to identify only a single type of defect, accompanied by relatively low accuracy, a Dilated Re-parameterized Residual-YOLO (DRR-YOLO) algorithm is proposed, which is capable of identifying four defects of each of the four insulator types. …”
Get full text
Article -
4599
Implicit Is Not Enough: Explicitly Enforcing Anatomical Priors inside Landmark Localization Models
Published 2024-09-01“…Currently, Anatomical Landmark Localization (ALL) is mainly solved by deep-learning methods, which cannot guarantee robust ALL predictions; there may always be outlier predictions that are far from their ground truth locations due to out-of-distribution inputs. …”
Get full text
Article -
4600
Advanced parameter extraction optimization technique for the four-diode model approach
Published 2024-12-01“…However, these models mainly focus on the fundamental mechanism of diffusion and Shockley-Read-Hall recombination. …”
Get full text
Article