In response to the challenges faced by visually impai red individuals when navigating their surroundings, this paper pr esents an enhanced machine vision object detection algorithm kno wn as NS-YOLO, which builds upon...
In response to the challenges faced by visually impai red individuals when navigating their surroundings, this paper pr esents an enhanced machine vision object detection algorithm kno wn as NS-YOLO, which builds upon YOLOV5s. NS-YOLO aims to achieve efficient and precise detection of complex scenarios in p edestrian walkways. Given the real-time demands of this applicati on, several enhancements have been made to YOLOV5s. Firstly, t he backbone feature extraction network of YOLOV5s has been re placed with MobileNetV3, leading to a significant reduction in the number of parameters and computational load through the use o f depthwise separable convolutions. Secondly, the NAM attention mechanism has been introduced to improve the model's computat ional efficiency. Lastly, a weighted attention mechanism (SimAM) has been incorporated before the prediction stage to dynamically adjust the model's focus, further improving feature representatio n capabilities in complex scenarios. Experimental results demonst rate that the NS-YOLO model enhances mAP50 by 4.5 compared to the original YOLOV5s model, all while achieving a detection sp eed of 90.88 FPS. NS-YOLO elevates detection accuracy while ma intaining detection speed, making it significantly superior to com parative algorithm models and meeting practical application requ irements, thus possessing substantial practical value.
Motorcycle accidents are a significant public concern worldwide. Accidents have been increasing rapidly which leads to the loss of several lives. One of the main contributing factors to the severity of injuries in the...
Motorcycle accidents are a significant public concern worldwide. Accidents have been increasing rapidly which leads to the loss of several lives. One of the main contributing factors to the severity of injuries in these accidents is the lack of helmet use. Though the usage of helmets is necessary, it is also considered a piece of mandatory safety equipment among drivers, but they do not make use of it which causes unfortunate incidents to take place. Traffic police do try to bring awareness among the people but most of the population refuses to follow them. To avoid such incidents and to detect people from breaking the rules, this research was introduced. Here, we present a study based on an automated helmet detectionsystem for motorcyclists using the combined techniques of YOLO and CNN. The combination of these image processing techniques such as You Only Look Once (YOLO) and Convolutional Neural Network (CNN) helps in the identification of helmets from image datasets. Because of this combination, the model can accurately identify helmets with a high degree of reliability due to the use of image datasets. And due to this combination, our system can accurately detect helmets with an accuracy of 94.29%.
As today39;s time is more dependent towards the internet, there are various types of malwares are being developed on daily basis, as per report presented by Kaspersky around 560,000 instances of malware created dail...
As today's time is more dependent towards the internet, there are various types of malwares are being developed on daily basis, as per report presented by Kaspersky around 560,000 instances of malware created daily. Malware are being developed in such a way that they can replicate and change their signature based on the types of detectionsystem present in organization. Due to urge of variety of malwares it is enables security researchers to shift towards use of Machine Learning for better protection towards variety of security systems. Use of machine learning makes the whole thing more productive and responsive. In this research we have suggested a system that detects diversity of viruses depending on their types response to the system, for the initial phase we have taken a Dataset of Malwares which contains 96,724 malware samples and 41,323 binaries, executable and dynamic link libraries which are legit files. Also we have contrasted the different types of machine learning Techniques which can be used for creating these types of system.
Phishing attacks continue to pose a threat to the internet users due to the consequences they bring, including the compromise of sensitive information, financial harm and reputational damage. In this research paper, w...
Phishing attacks continue to pose a threat to the internet users due to the consequences they bring, including the compromise of sensitive information, financial harm and reputational damage. In this research paper, we propose to create a free access, ad-free and non-profit website that uses machine learning algorithms to identify phishing URLs. This website shall be designed to provide users with a reliable and user-friendly tool to evaluate the legitimacy of the URLs they come from. Using different data-sets containing phishing and legitimate URLs, extract important features to train the classification model. The model will be embedded in website, which will evaluate user-submitted URLs and provides true phishing detection. There exists report, which claims on the website where users can contribute to the collective fight against phishing attacks by reporting phishing URLs they encountered. In this way users actively contribute to the development of the and improved efficiency of the system.
Detecting objects through video frames is a difficult process due to several issues, such as poor quality of frames, pose changes, occlusions, video defocusing, and motion blur. The closely arranged frames make it mor...
Detecting objects through video frames is a difficult process due to several issues, such as poor quality of frames, pose changes, occlusions, video defocusing, and motion blur. The closely arranged frames make it more complicated to detect the object in video streams. A common strategy employed to identify the problem is to correctly detect objects through video sequences. Considering these problems, the Faster Region-Convolutional Neural Network (FRCNN) is implemented to detect objects in video streams. At first, the Region proposal network (RPN) is used to generate the objects feature, and then the Convolutional Neural Network (CNN) classifies the RPN objects' features. Then the proposed architecture is combined with the ResNet50, which is the backbone of the Faster R-CNN pipeline, defining the FRCNN-ResNet50 object detector that constant detects objects in video streams. Then the model is evaluated in the DAVIS dataset and gets the F-measure 0.893, S-Measure 0.859, and Mean Absolute Error (MAE) 0.016 respectively. Compared to recent works like CSAttention-ConvLSTM, Deep-GCN, CFCN-MA, the proposed model achieves a higher detection rate and lower false detection.
With the continuous development of statistics and computer science, people’s demand for data mining and potential information analysis is increasing. There are a lot of relational data in the world. As the core of da...
With the continuous development of statistics and computer science, people’s demand for data mining and potential information analysis is increasing. There are a lot of relational data in the world. As the core of data analysis and mining, data analysis algorithms significantly impact the effectiveness and results of data analysis. A relationship graph is an essential tool for in-depth association analysis. This paper proposes a graph-based data screening and analysis evaluation system using the relationship graph. First, this paper proposes an entity retrieval and location algorithm to establish the entity and relationship network for the research. Then, a relationship graph is established to extract frequent data items for the relationship network. In addition, to facilitate the subsequent data scoring and analysis, we have established a graph-based data screening process and completed the above tasks by defining an evaluation matrix. Finally, we practice the constructed relationship graph in the application scenario of scientific and technological data analysis. The research is based on statistics and computer science, with in-depth research and applications on relationship graphs. It is expected to provide some references for designing and applying data analysis algorithms.
In order to quickly and accurately detect the moisture content of coal and realize online non-destructive testing. An on-line measurement system of coal moisture content based on the principle of microwave transmissio...
详细信息
In order to quickly and accurately detect the moisture content of coal and realize online non-destructive testing. An on-line measurement system of coal moisture content based on the principle of microwave transmission is designed. The measurement principle is introduced emphatically, and a method for quickly detecting the moisture content of coal by detecting the voltage signal is proposed. Different fitting models between decay voltage and water content were established, and the best calibration equation was determined by comparing different fitting models. On this basis, a coal moisture detection device applied to the conveyor belt was developed. The device consists of a 10GHz microwave signal source, a horn antenna, a detector, a single-chip microcomputer, an electric conveyor belt machine and a sample holder. Finally, coals with different moisture contents were evaluated experimentally. The results show that the measurement accuracy and deviation of the system are within the acceptable range.
There has been a meteoric rise in the use of online payment systems recently. Multiple e-payment systems exist, each designed to provide the highest degree of security while maintaining the greatest possible convenien...
There has been a meteoric rise in the use of online payment systems recently. Multiple e-payment systems exist, each designed to provide the highest degree of security while maintaining the greatest possible convenience for online shoppers. Cyber-attack techniques, on the other hand, are developing at the same rapid pace as security mechanisms. The authors of this paper examine the history of electronic payment systems, from the development of the corresponding language through the emergence of today's standard electronic payment systems. It also reveals a lack of security measures and approaches to fixing the problem. The current survey research makes a significant contribution by outlining the state of the electronic payment system framework and the possibilities it presents for the development of e-commerce in the future. The rates of suspicious purchases, which will serve as a yardstick in the creation of a trustworthy e-payment system, have been briefly discussed and analyzed.
The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert...
The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert channel use is still in its early phases, even though information security concerns are growing as a result of quick technology advancements. As a result, several problems and concerns need to be resolved, and the future plan is foggy. This paper seeks to give a thorough comparison of earlier and more recent attempts in this field. It offers a survey of the literature on the drawbacks and gaps in conventional detection techniques, emphasizing the most recent techniques for discovering and creating these covert channels while carefully considering machine learning and deep learning-based detection techniques. Additionally, it broadens the topic to cover the crucial function that these channels play in technology. Timing channels, storage channels, and hybrid channels are just a few of the ways covert channels may be utilized to transfer data. They can be used to get around security measures like intrusion detectionsystems and firewalls. Additionally, they may be used to steal confidential data from a system, including passwords, credit card numbers, and intellectual property. system security is seriously threatened by covert channels, and more study on covert channel production and detection is required to stay up with the changing threat environment.
The safety of insulators is related to the stability of power transmission and economic livelihood. UAV inspection has the importance of improving detection efficiency and adapting to complex terrain. In this paper, b...
详细信息
ISBN:
(数字)9798350372052
ISBN:
(纸本)9798350372069
The safety of insulators is related to the stability of power transmission and economic livelihood. UAV inspection has the importance of improving detection efficiency and adapting to complex terrain. In this paper, based on MobileNetV3 and coordinate attention, the YOLOv5 detection algorithm is improved. The number of parameters is reduced by 2.1 GFLOPs compared with the YOLOv5n model, and the ability of the network to learn the relative positions of defects and insulators is strengthened, so that the detection accuracy increases. It has the potential to be applied in UAV transmission line inspection.
暂无评论