Banks play a pivotal role in generating significant profits through loan operations. However, the challenge lies in accurately identifying genuine loan applicants who are likely to repay their loans. Manual processes ...
详细信息
A fully autonomous wall-painting robot is the focus of this paper's development, expansion, and implementation efforts. Research efforts have not communicated much about interior wall painting. Numerous studies ha...
详细信息
Home automation system with web server deployment is developed using Raspberry Pi Pico and micropython, which turns ON the lights based on the count of persons inside that particular room. The system uses Infrared Red...
详细信息
Conventional picture creation requests noteworthy ability and labor, frequently constraining inventive expression to a select gather of capable specialists. This restrictiveness makes obstructions for amateurs and dev...
详细信息
Facial expression recognition (FER) is an important task in computer vision, having practical applications in areas such as human-computer interaction, education, healthcare, and online monitoring. Although significan...
详细信息
Random-matrix based extended object tracking (EOT) has received much attention for the simple yet effective scheme. Multiple sensors can bring more information due to the different perspectives and characteristics esp...
详细信息
The efficiency of a bidirectional full-bridge DCDC converter is determined by the magnitude of the reverse power and inductor current stress. Although the presence of inner current shifting in the DPS control reduces ...
详细信息
Phishing attacks are a major cybersecurity threat that resulted in over 1.2 million incidents in the first half of 2020. These attacks caused substantial financial losses and posed risks to individuals and organizatio...
详细信息
With the rapid development of computer technology and internet technology, the issue of information security has become increasingly prominent. Physical Unclonable Technology (PUT), based on circuit implementation, is...
详细信息
One of the cornerstones of Lean manufacturing, according to academic research, is the 5S+1, which introduces quality in manufacturing. This study aims to demonstrate how computer-based vision and object detection algo...
详细信息
ISBN:
(纸本)9783031381645;9783031381652
One of the cornerstones of Lean manufacturing, according to academic research, is the 5S+1, which introduces quality in manufacturing. This study aims to demonstrate how computer-based vision and object detection algorithms, can assist in the implementation of safety as 6th S in 5S+1 by monitoring and identifying employees who disregard accepted safety procedures, like wearing Personal Protective Equipment (PPE). The research evaluated the performance indicators of a detection technique and reviewed and analyzed it. To confirmworkers' PPE compliance, the suggested model used the You-Only-Look-Once (YOLO v7) architecture. A deep learning technique was subsequently applied to confirm the safety helmets and safety vests. This strategy is determined to be the most effective when using the VGG-16 algorithm, achieving an 80% F1 score and processing 11.79 frames per second (FPS), making it ideal for real-time detection.
暂无评论