Object detection is an important task in drone vision. Since the number of objects and their scales always vary greatly in the drone-captured video, small object-oriented feature becomes the bottleneck of model perfor...
详细信息
Object detection is an important task in drone vision. Since the number of objects and their scales always vary greatly in the drone-captured video, small object-oriented feature becomes the bottleneck of model performance, and most existing object detectors tend to underperform in drone-vision scenes. To solve these problems, we propose a novel detector named YOLO-Drone. In the proposed detector, the backbone of YOLO is firstly replaced with ConvNeXt, which is the state-of-the-art one to extract more discriminative features. Then, a novel scale-aware attention(SAA) module is designed in detection head to solve the large disparity scale problem. A scale-sensitive loss(SSL) is also introduced to put more emphasis on object scale to enhance the discriminative ability of the proposed detector. Experimental results on the latest VisDrone 2022 test-challenge dataset(detection track) show that our detector can achieve average precision(AP) of 39.43%, which is tied with the previous state-of-the-art, meanwhile,reducing 39.8% of the computational cost.
The article deals with the approaches to the definition of online education. Its basic components are described. There is considered the experience of the training of the students in the pedagogical universities to th...
详细信息
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t...
详细信息
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and *** the exponential growth of digital data,robust security measures are *** encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key *** their individual benefits,both require significant computational ***,performing them separately for the same data increases complexity and processing *** the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and *** on 128-bit block sizes and a 256-bit secret key *** combines Huffman coding for compression and a Tent map for ***,an iterative Arnold cat map further enhances cryptographic confusion *** analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field.
This study delves into the unique aspects of the formation of digital financial literacy among future digital consultants., particularly focusing on the modules of the training program and the structure of the module ...
详细信息
Topological data analysis (TDA) is increasingly acknowledged within financial markets for its capacity to manage complexity and discern nuanced patterns and structures. It has been applied effectively to uncover intri...
详细信息
The article deals with a number of issues of training the digital consultants in the online communities of the schoolchildren. Specifically, there are described the modules of the training program, there is substantia...
详细信息
The article deals with the issues of the modernization of the further training system of the teaching staff in the context of the digitalization of the general education. There is presented the theoretical and pedagog...
详细信息
The article deals with a number of issues of teaching school students in online communities. There is specified the definition of online communities, there is considered the classification of online communities. The a...
详细信息
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos...
详细信息
In this study, we compare the virtual and real gait parameters to investigate the effect of appearances of embodied avatars and virtual reality experience on gait in physical and virtual environments. We developed a v...
详细信息
暂无评论