In the field of real-time object detection, the YOLO series has become a mainstream approach due to its exceptional performance. However, its performance on small object detection still has room for improvement. Small...
详细信息
ISBN:
(纸本)9798400710865
In the field of real-time object detection, the YOLO series has become a mainstream approach due to its exceptional performance. However, its performance on small object detection still has room for improvement. Small objects often struggle with limited feature representation in the P3, P4, and P5 detection layers. Traditional methods to address this issue typically add a P2 detection layer to enhance small object detection capabilities, but this often leads to a significant increase in computation and extended post-processing time. Therefore, developing an efficient and effective feature pyramid tailored for small objects has become an urgent problem to solve. This paper proposes a network specifically optimized for small object detection-YOLO-CSPOKM, which significantly enhances the performance of small object detection while also improving the detection of general objects. Based on the original PAFPN structure, we designed a Small Object Enhance Pyramid: the P2 feature layer is processed using SPD-Conv to extract features rich in small object information and then fused with the P3 layer. Subsequently, the CSP (Cross Stage Partial) strategy is employed to split input features along the channel dimension. One portion of the features is passed through the Omni-Kernel module to effectively capture multi-scale features ranging from global to local levels, while the other portion is concatenated with the Omni-Kernel output via skip connections. Furthermore, the P3, P4, and P5 features are passed through the SSFF module, and their output is added to the results from the CSPOKM module. Finally, the combined features are sent to the detection head, achieving a comprehensive enhancement in small object detection. Experiments on the MS COCO dataset demonstrate that compared to the baseline YOLOv8n model, YOLO-CSPOKM improves mAP@0.5:0.95 to 39.2%, a 2.8% increase, while maintaining a compact model size. When extended to the YOLOv8s model, the enhanced version achieves an mA
Vehicle re-identification (ReID) is an important component of intelligent transportation systems, yet existing methods often struggle with challenges such as inter-class similarity, viewpoint variations, and environme...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has bee...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has been known about the underlying relationships and how they reflect(or affect) user behaviors. To fill this gap, we characterize the app recommendation relationships in the i OS app store from the perspective of the complex network. We collect a dataset containing over 1.3 million apps and 50 million app recommendations. This dataset enables us to construct a complex network that captures app recommendation relationships. Through this, we explore the recommendation relationships between mobile apps and how these relationships reflect or affect user behavior patterns. The insights gained from our research can be valuable for understanding typical user behaviors and identifying potential policy-violating apps.
Corner cases are a focal issue in current autonomous driving systems, with a significant portion attributed to few-shot detection. Due to the sparse distribution of point cloud data and the real-time requirements of a...
详细信息
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal...
详细信息
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scale object detection algorithm based on an improved YOLOv8 has been proposed. Firstly, a lightweight attention mechanism, Triplet Attention, is introduced to enhance the algorithm’s ability to extract multi-dimensional and multi-scale features, thereby improving the receptive capability of the feature maps. Secondly, the Diverse Branch Block (DBB) is integrated into the CSP Bottleneck with two Convolutions (C2F) module to strengthen the fusion of semantic information across different layers. Thirdly, a new decoupled detection head is proposed by redesigning the original network head based on the Diverse Branch Block module to improve detection accuracy and reduce missed and false detections. Finally, the Minimum Point Distance based Intersection-over-Union (MPDIoU) is used to replace the original YOLOv8 Complete Intersection-over-Union (CIoU) to accelerate the network’s training convergence. Comparative experiments and dehazing pre-processing tests were conducted on the RTTS and VOC-Fog datasets. Compared to the baseline YOLOv8 model, the improved algorithm achieved mean Average Precision (mAP) improvements of 4.6% and 3.8%, respectively. After defogging pre-processing, the mAP increased by 5.3% and 4.4%, respectively. The experimental results demonstrate that the improved algorithm exhibits high practicality and effectiveness in foggy traffic scenarios.
Cooperative unmanned aerial vehicles (UAVs) cluster technology is considered a prospective solution for area coverage problems, enabling network access and emergency communications in remote areas. In this paper, we i...
详细信息
In current semi-supervised object detection techniques, one-stage detectors typically realize only limited improvements when compared to two-stage detectors. The limitation is largely due to the assignment of incorrec...
详细信息
The detection of skin cancer holds paramount importance worldwide due to its impact on global health. While deep convolutional neural networks (DCNNs) have shown potential in this domain, current approaches often stru...
详细信息
Large language models (LLMs) have significantly advanced smart education in the artificial general intelligence era. A promising application lies in the automatic generalization of instructional design for curriculum ...
详细信息
Non-Orthogonal Multiple Access (NOMA) systems are becoming relevant in the fast-expanding terrain of large-scale networks because of their efficiency in concurrently managing many users. This is true since NOMA system...
详细信息
ISBN:
(纸本)9798331527549
Non-Orthogonal Multiple Access (NOMA) systems are becoming relevant in the fast-expanding terrain of large-scale networks because of their efficiency in concurrently managing many users. This is true since NOMA systems let numerous users concurrently be managed. On the other hand, the intricacy of these networks leaves them vulnerable to a wide spectrum of attacks, including the more advanced and erratic NOMA attacks on the network. These strikes could produce major disturbances that would compromise the quality of service and cast questions regarding the general network security. It has been demonstrated that the effective projection of these hazards is limited by standard linear and probabilistic techniques. This is true as contemporary methods fail to adequately capture the basic non-linear dynamics of these large-scale networks. This article offers a novel method for NOMA attack prediction by means of a non-linear chaotic belief process. The results are shown here. To recreate the uncertainty and intricate interactions inside the network, the proposed method which is the logistic map which in turn generates the sequences for ensuring the accurate iterative updates which in turn provides better scalability and precision. This integrates belief networks with chaos theory. More exactly, we capture the random and nonlinear aspect of network dynamics by building belief values indicating the likelihood of an attack by use of a chaotic map. After that, the belief values proliferate across the network in search of defects and project the probability of NOMA attacks. Effectiveness of the proposed method is demonstrated by test results on a simulated large-scale network simulation. With a prediction accuracy of 92.7%, the chaotic belief mechanism obtained much above the average accuracy of 78.4% of traditional linear prediction systems. Moreover, the proposed approach lowered the false positive rate to 5.3%, substantially below the rate of 12.8% applied in the standard ap
暂无评论