Suggested Topics within your search.
Suggested Topics within your search.
-
781
Improved YOLOv7-Tiny for the Detection of Common Rice Leaf Diseases in Smart Agriculture
Published 2024-11-01“…The MobileNetV3 lightweight network is introduced to replace the backbone network of YOLOv7-tiny, which reduces the size of the model parameters and improves the extraction capability of features of different sizes; the RCS-OSA is used to replace the original ELAN-1 module, which improves the extraction capability of interlayer features; the TSCODE detector head is designed to enhance the extraction capability of the model for small targets; and the MPDIoU loss function is used to improve the model’s convergence speed and effect. …”
Get full text
Article -
782
Modelling and optimization of TPMLMs with slotted stators based on Bayesian DNN
Published 2024-11-01“…Then, a multi‐objective optimisation problem for the slotted TPMLM is carried out based on the multi‐objective black hole algorithm. …”
Get full text
Article -
783
Efficient and fully simulated oblivious transfer protocol on elliptic curve
Published 2023-02-01“…Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.…”
Get full text
Article -
784
Unifying Non-Markovian Characterization with an Efficient and Self-Consistent Framework
Published 2025-05-01“…Here, we make deep strides to remedy this problem. We establish a theoretical framework that uniformly incorporates and classifies all non-Markovian phenomena. …”
Get full text
Article -
785
A Bionic Social Learning Strategy Pigeon-Inspired Optimization for Multi-Unmanned Aerial Vehicle Cooperative Path Planning
Published 2025-01-01“…Subsequently, a path-planning model, detection units’ network model, and cost estimation are constructed. …”
Get full text
Article -
786
Unveiling fine-scale spatial structures and amplifying gene expression signals in ultra-large ST slices with HERGAST
Published 2025-04-01“…To tackle the potential over-smoothing problem arising from data splitting, we construct a heterogeneous graph network to incorporate both local and global spatial relationships. …”
Get full text
Article -
787
A decentralized power dispatch strategy in an electric vehicle charging station
Published 2021-03-01“…Abstract In this study, a decentralized power dispatch in a charging station serving electric vehicles (EVs) is discussed. The power dispatch problem is solved through a Stackelberg game in real time. …”
Get full text
Article -
788
HiCDiffusion - diffusion-enhanced, transformer-based prediction of chromatin interactions from DNA sequences
Published 2024-10-01“…In our study, we propose the HiCDiffusion, sequence-only model that addresses this problem. We first train the encoder-decoder neural network and then use it as a component of the diffusion model - where we guide the diffusion using a latent representation of the sequence, as well as the final output from the encoder-decoder. …”
Get full text
Article -
789
Aviation Rivet Classification and Anomaly Detection Based on Deep Learning
Published 2023-01-01“…The shortage of personnel and the high cost have become a major pain point in the current safety supervision work of the inspectors. Aiming at the problem that the aircraft maintenance inspector could not visit the scene in person during the epidemic, a remote safety supervision platform was built based on intelligent glasses and 5G network, and the real-time monitoring of the aircraft skin rivet status was realized. …”
Get full text
Article -
790
A few-shot diabetes foot ulcer image classification method based on deep ResNet and transfer learning
Published 2024-12-01“…The objective of the study is to propose a few-shot DFU image classification method based on deep residual neural network and transfer learning. Considering the difficulty in obtaining clinical DFU images, it is a few-shot problem. …”
Get full text
Article -
791
Multi-defect detection and classification for aluminum alloys with enhanced YOLOv8.
Published 2025-01-01“…Finally, the backbone network structure is reconstructed. Fine-grained adjustments and improvements are made to enhance neck network layers and the feature extraction capability. …”
Get full text
Article -
792
Resource allocation for coexistence of eMBB and bursty URLLC based on queueing with preemption
Published 2025-05-01“…Based on this analysis, we formulate a mixed-integer nonlinear programming problem to minimize the average delay of URLLC packets while satisfying the average delay and throughput requirements of eMBB by jointly optimizing the eMBB subcarrier allocation, the URLLC subcarrier scheduling and the computing resource allocation. …”
Get full text
Article -
793
DLML-PC: an automated deep learning and metric learning approach for precise soybean pod classification and counting in intact plants
Published 2025-07-01“…By improving the Siamese Network in metric learning, the optimal Siamese Network model was obtained. …”
Get full text
Article -
794
A Distributed Cooperative Anti-Windup Algorithm Improving Voltage Profile in Distribution Systems with DERs’ Reactive Power Saturation
Published 2025-07-01“…This paper proposes a Distributed Cooperative Algorithm (DCA) that solves the windup problem caused by the saturation of the Distributed Energy Resource (DER) PI-based control unit. …”
Get full text
Article -
795
Dual-robot formation transport in random environment and narrow restricted area via improved DDPG navigation
Published 2025-02-01“…The method aimed at generating optimized navigation paths for leader–follower robot formations to complete tasks such as moving objects, designing swap decision reward function for DDPG to resolving the problem of blocked exits in narrow areas. Specifically, the paper first optimizes the reward function module in the DDPG network to incorporate a decision-swapping reward mechanism for training the formation's navigation capability. …”
Get full text
Article -
796
AReal-time Detection Method of Vehicle Target Based on Improved YOLOv5s Algorithm
Published 2024-02-01“…For the problem of heterogeneous redundant frames,weighted non-maximum value suppression is used to fuse the information of both frames to improve the detection accuracy. …”
Get full text
Article -
797
Teamwork without talking: distributed system estimates maintain approximately centralized control of smart urban drainage systems during communications outages
Published 2025-01-01“…We show robustness to communications outages; maintaining centralized control in this case study when reporting only once every 7 days on average. We also examine the role of relative position within the network in determining the accuracy of each microcontroller’s estimates of depths in the other storage basins. …”
Get full text
Article -
798
A dual self-attentive transformer U-Net model for precise pancreatic segmentation and fat fraction estimation
Published 2025-08-01“…The most widely used pancreas segmentation technique is a U-shaped network based on deep convolutional neural networks (DCNNs). …”
Get full text
Article -
799
A Multimodal Approach of Machine and Deep Learnings to Enhance the Fall of Elderly People
Published 2022-05-01“…As such, the motivation for this research is to implement an algorithmic solution to the problem of falls that leverages the benefits of Machine Learning to detect falls in the elderly. …”
Get full text
Article -
800
Rough-and-Refine Model for Scene Graph Generation
Published 2025-01-01“…The TQG and EPR modules also provide a degree of improvement, with average decreases of 4.7% and 5.2% when removed. The model represented in the first row of the table, which excludes all four modules, is equivalent to the Rough Part, showing an average decrease of 24.9%.ConclusionsTo address the issue of insufficient predicate representation, a scene graph generation method based on a Rough-and-Refine network is proposed. …”
Get full text
Article