|
|
|
Mohammad Alhumaid and Ayman G. Fayoumi
Paranasal sinus pathologies, particularly those affecting the maxillary sinuses, pose significant challenges in diagnosis and treatment due to the complex anatomical structures and diverse disease manifestations. The aim of this study is to investigate t...
ver más
|
|
|
|
|
|
|
Yu Zhang, Jiajun Niu, Zezhong Huang, Chunlei Pan, Yueju Xue and Fengxiao Tan
An algorithm model based on computer vision is one of the critical technologies that are imperative for agriculture and forestry planting. In this paper, a vision algorithm model based on StyleGAN and improved YOLOv5s is proposed to detect sandalwood tre...
ver más
|
|
|
|
|
|
|
Sideris Kiratsoudis and Vassilis Tsiantos
Personnel selection stands as a pivotal component within the domain of human resource management, intrinsically tethered to the quality of the workforce at large. In this research endeavor, we introduce the Entropy Synergy Analysis of Multi-Attribute Dec...
ver más
|
|
|
|
|
|
|
Nan Lao Ywet, Aye Aye Maw, Tuan Anh Nguyen and Jae-Woo Lee
Urban Air Mobility (UAM) emerges as a transformative approach to address urban congestion and pollution, offering efficient and sustainable transportation for people and goods. Central to UAM is the Operational Digital Twin (ODT), which plays a crucial r...
ver más
|
|
|
|
|
|
|
Nikola Andelic and Sandi Baressi ?egota
This investigation underscores the paramount imperative of discerning network intrusions as a pivotal measure to fortify digital systems and shield sensitive data from unauthorized access, manipulation, and potential compromise. The principal aim of this...
ver más
|
|
|
|
|
|
|
Chuanyun Wang, Linlin Meng, Qian Gao, Jingjing Wang, Tian Wang, Xiaona Liu, Furui Du, Linlin Wang and Ershen Wang
Aiming at the problems of low detection accuracy and large computing resource consumption of existing Unmanned Aerial Vehicle (UAV) detection algorithms for anti-UAV, this paper proposes a lightweight UAV swarm detection method based on You Only Look Onc...
ver más
|
|
|
|
|
|
|
Endrowednes Kuantama, Avishkar Seth, Alice James and Yihao Zhang
The effectiveness of human security-based guard patrol systems often faces challenges related to the consistency of perimeter checks regarding timing and patterns. Some solutions use autonomous drones for monitoring assistance but primarily optimize thei...
ver más
|
|
|
|
|
|
|
Zhaoyan Wu, Hao Li and Peng Yue
Recent developments in Web Service and Semantic Web technologies have shown great promise for the automatic chaining of geographic information services (GIService), which can derive user-specific information and knowledge from large volumes of data in th...
ver más
|
|
|
|
|
|
|
Timothy Tadj, Reza Arablouei and Volkan Dedeoglu
Data trust in IoT is crucial for safeguarding privacy, security, reliable decision-making, user acceptance, and complying with regulations. Various approaches based on supervised or unsupervised machine learning (ML) have recently been proposed for evalu...
ver más
|
|
|
|
|
|
|
Manlika Seefong, Panuwat Wisutwattanasak, Chamroeun Se, Kestsirin Theerathitichaipa, Sajjakaj Jomnonkwao, Thanapong Champahom, Vatanavongs Ratanavaraha and Rattanaporn Kasemsri
Machine learning currently holds a vital position in predicting collision severity. Identifying factors associated with heightened risks of injury and fatalities aids in enhancing road safety measures and management. Presently, Thailand faces considerabl...
ver más
|
|
|
|