|
|
|
Junsheng Liu, Guangze Zhao, Shuangxi Liu, Yi Liu, Huawei Yang, Jingwei Sun, Yinfa Yan, Guoqiang Fan, Jinxing Wang and Hongjian Zhang
In the realm of automated apple picking operations, the real-time monitoring of apple maturity and diameter characteristics is of paramount importance. Given the constraints associated with feature detection of apples in automated harvesting, this study ...
ver más
|
|
|
|
|
|
|
Haojie Wang, Pingqing Fan, Xipei Ma and Yansong Wang
The intelligent identification of coal gangue on industrial conveyor belts is a crucial technology for the precise sorting of coal gangue. To address the issues in coal gangue detection algorithms, such as high false negative rates, complex network struc...
ver más
|
|
|
|
|
|
|
Jiao Su, Yi An, Jialin Wu and Kai Zhang
Pedestrian detection has always been a difficult and hot spot in computer vision research. At the same time, pedestrian detection technology plays an important role in many applications, such as intelligent transportation and security monitoring. In comp...
ver más
|
|
|
|
|
|
|
Jiantao Qu, Chunyu Qi and He Meng
Within the Shuo Huang Railway Company (Suning, China ) the long-term evolution for railways (LTE-R) network carries core wireless communication services for trains. The communication performance of LTE-R cells directly affects the operational safety of t...
ver más
|
|
|
|
|
|
|
Yiheng Zhou, Kainan Ma, Qian Sun, Zhaoyuxuan Wang and Ming Liu
Over the past several decades, deep neural networks have been extensively applied to medical image segmentation tasks, achieving significant success. However, the effectiveness of traditional deep segmentation networks is substantially limited by the sma...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
|
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d...
ver más
|
|
|
|
|
|
|
Chinyang Henry Tseng, Woei-Jiunn Tsaur and Yueh-Mao Shen
In detecting large-scale attacks, deep neural networks (DNNs) are an effective approach based on high-quality training data samples. Feature selection and feature extraction are the primary approaches for data quality enhancement for high-accuracy intrus...
ver más
|
|
|
|
|
|
|
Weiming Fan, Jiahui Yu and Zhaojie Ju
Endoscopy, a pervasive instrument for the diagnosis and treatment of hollow anatomical structures, conventionally necessitates the arduous manual scrutiny of seasoned medical experts. Nevertheless, the recent strides in deep learning technologies proffer...
ver más
|
|
|
|
|
|
|
Zhikai Jiang, Li Su and Yuxin Sun
Accurate ship object detection ensures navigation safety and effective maritime traffic management. Existing ship target detection models often have the problem of missed detection in complex marine environments, and it is hard to achieve high accuracy a...
ver más
|
|
|
|