Suggested Topics within your search.
Suggested Topics within your search.
-
641
YOLOv5 garbage classification method with GhostNet
Published 2024-01-01“…Garbage classification is an important part of building ecological civilization. To solve the problem that heavyweight models are difficult to deploy to mobile devices, an improved garbage image classification method based on YOLOv5 network is proposed. …”
Get full text
Article -
642
POWER DRIVEN SYNTHESIS OF COMBINATIONAL CIRCUITS ON THE BASE OF CMOS VLSI LIBRARY ELEMENTS
Published 2016-10-01“…A problem of synthesis of multi-level logical networks using CMOS VLSI cell library is considered. …”
Get full text
Article -
643
PCB defect detection based on pseudo-inverse transformation and YOLOv5.
Published 2024-01-01“…Compared with other models, the proposed PCB defect detection model had an average increase of 10.90% in recall and 12.87% in average detection accuracy. …”
Get full text
Article -
644
An improve fraud detection framework via dynamic representations and adaptive frequency response filter
Published 2025-05-01“…Leveraging previous research, we constructed a latent synergy network (LSN) through second-order relations. Analysis of LSN exposed that fraudsters, seeking to elude detection, adopt deceptive behaviors by establishing connections with numerous normal users, leading to the over-smoothing problem in traditional GNN models. …”
Get full text
Article -
645
Cross-ViT based benign and malignant classification of pulmonary nodules.
Published 2025-01-01“…To solve this problem, a Cross fusion attention ViT (Cross-ViT) network that fuses local features extracted by CNN and global features extracted by Transformer is proposed. …”
Get full text
Article -
646
Time-varing effect of policy uncertainty on A-share industry returns- A novel Bayesian approach.
Published 2025-01-01“…Empirical results reveal following key findings: On average, network spillover effects explain approximately 39% of the response of A-share industry returns to policy uncertainty. …”
Get full text
Article -
647
Quantifying the phenotypic information in mRNA abundance
Published 2022-08-01“…Using an information theory approach, we analyzed multimodal data of the expression of 83 genes in the Ca2+ signaling network and the dynamic Ca2+ response in the same cell. …”
Get full text
Article -
648
A joint optimization method of multi backhaul link selection and power allocation in 6G
Published 2023-06-01“…Aiming at the problem of limited single backhaul link capability of base stations in hotspot areas of the 6G system, a joint optimization method was proposed for multi-backhaul link selection and power allocation in an elastic coverage system, so that the data packets can select the appropriate backhaul link and transmission power according to their service characteristics and link conditions.Firstly, the transmission delay of data packets on the small cell sub-queue was analyzed by using queuing theory.Then, the optimization objective was modeled with the maximum delay tolerance elasticity value.Finally, the optimization problem were solved by the Hungarian algorithm and the Lagrangian duality and gradient descent method.The simulation results show that, compared with the traditional algorithm, the algorithm proposed reduces the average delay of URLLC (ultra-reliable and low-latency communication) service data packets and eMBB (enhanced mobile broadband) service data packets by 17% and 14% respectively, and effectively improves the network transmission rate.…”
Get full text
Article -
649
Arcing detection method of metro pantograph based on improved yolov4-tiny
Published 2023-07-01“…In order to improve the detection ability of small targets, this method incorporated a third-scale prediction branch to the original two-scale prediction branches of yolov4-tiny, to enable the positioning of small arcs in the shallow network. Moreover, a receptive field block (RFB) module was embedded beneath the backbone network, to expand the network′s receptive field and enhance the model′s feature extraction ability. …”
Get full text
Article -
650
Novel Aggregation Framework for Electric Bus Fleet Scheduling
Published 2025-01-01“…Charging stations are distributed in the road network, and the charging can be done in-between service trips. …”
Get full text
Article -
651
Research on geomagnetic indoor high-precision positioning algorithm based on generative model
Published 2023-06-01“…Aiming at the current bottleneck of constructing a fine geomagnetic fingerprint library that required a lot of labor costs, two generative models called the conditional variational autoencoder and the conditional confrontational generative network were proposed, which could collect a small number of data samples for a given location, and generate pseudo-label fingerprints.At the same time, in order to solve the problem of low positioning accuracy of single-point geomagnetic fingerprints, a geomagnetic sequence positioning algorithm based on attention mechanism of convolutional neural network-gated recurrent unit was designed, which could effectively use the spatial and temporal characteristics of fingerprints to achieve precise positioning.In addition, a real-time, portable mobile terminal data collection and positioning system was also designed and built.The actual test shows that the proposed model can effectively construct the available geomagnetic fingerprint database, and the average error of the proposed algorithm can reach 0.16 m.…”
Get full text
Article -
652
Spectrum resource allocation for high-throughput satellite communications based on behavior cloning
Published 2024-05-01“…In high-throughput multi-beam satellite systems, the dimensionality of the spectrum resource allocation problem increased drastically with the number of satellite beams and service users, which caused an exponential rise in the complexity of the solution. …”
Get full text
Article -
653
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01“…To address the problem of identification of authenticity and integrity of video content and the location of video tampering area,a deep learning detection algorithm based on video noise flow was proposed.Firstly,based on SRM (spatial rich model) and C3D (3D convolution) neural network,a feature extractor,a frame discriminator and a RPN (region proposal network) based spatial locator were constructed.Secondly,the feature extractor was combined with the frame discriminator and the spatial locator respectively,and then two neural networks were built.Finally,two kinds of deep learning models were trained by the enhanced data,which were used to locate the tampered area in temporal domain and spatial domain respectively.The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%,which can effectively locate the tamper area in temporal domain and spatial domain.…”
Get full text
Article -
654
Evaluation method of hydrophobicity of composite insulators based on improved Mask R-CNN
Published 2025-04-01“…In this paper, the classification problem is transformed into the target detection problem, and the improved mask region-based convolutional neural network (Mask R-CNN) algorithm is used to evaluate the hydrophobicity level of composite insulators. …”
Get full text
Article -
655
Examination of WHO/INRUD Core Drug Use Indicators at Public Primary Healthcare Centers in Kisii County, Kenya
Published 2020-01-01“…Irrational drug use is a global problem. However, the extent of the problem is higher in low-income countries. …”
Get full text
Article -
656
Attention-Based Multi-Objective Control for Morphing Aircraft
Published 2025-04-01“…Subsequently, an auxiliary problem, employing <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mi>ϵ</mi></semantics></math></inline-formula>-constraint and augmented state methods, is introduced to yield a finite and locally Lipschitz continuous value function, which facilitates the construction of a neural network controller. …”
Get full text
Article -
657
Entropy-Based Age-Aware Scheduling Strategy for UAV-Assisted IoT Data Transmission
Published 2025-05-01“…This paper investigates data transmission in an Internet of Things (IoT) network, where multiple devices send environmental data to a remote base station through an unmanned aerial vehicle (UAV) relay. …”
Get full text
Article -
658
An Unmanned Delivery Vehicle Path-Planning Method Based on Point-Graph Joint Embedding and Dual Decoders
Published 2025-03-01“…This novel deep neural network model incorporates an attention mechanism and applies a method called point-graph joint embedding and dual decoders (PGDD) to solve the problem. …”
Get full text
Article -
659
Target Tracking Algorithm Based on Adaptive Scale Detection Learning
Published 2021-01-01“…In this paper, to better solve the problem of low tracking accuracy caused by the sudden change of target scale, we design and propose an adaptive scale mutation tracking algorithm using a deep learning network to detect the target first and then track it using the kernel correlation filtering method and verify the effectiveness of the model through experiments. …”
Get full text
Article -
660
MSAM:Video Question Answering Based on Multi-Stage Attention Model
Published 2022-08-01“…The video question answering (VideoQA) task requires understanding of semantic information of both the video and question to generate the answer.At present, it is difficult for VideoQA methods that are based on attention model to fully understand and accurately locate video information related to the question.To solve this problem, a multi-stage attention model network (MSAMN) is proposed. …”
Get full text
Article