Printed circuit boards(PCBs)provide stable connections between electronic ***,defective printed circuit boards may cause the entire equipment system to malfunction,resulting in incalculable ***,it is crucial to detect...
详细信息
Printed circuit boards(PCBs)provide stable connections between electronic ***,defective printed circuit boards may cause the entire equipment system to malfunction,resulting in incalculable ***,it is crucial to detect defective printed circuit boards during the generation *** detection methods have low accuracy in detecting subtle defects in complex background *** order to improve the detection accuracy of surface defects on industrial printed circuit boards,this paper proposes a residual large kernel network based on YOLOv5(You Only Look Once version 5)for PCBs surface defect detection,called YOLO-RLC(You Only Look Once-Residual Large Kernel).Build a deep large kernel backbone to expand the effective field of view,capture global informationmore efficiently,and use 1×1 convolutions to balance the depth of the model,improving feature extraction efficiency through reparameterization *** neck network introduces a bidirectional weighted feature fusion network,combined with a brand-new noise filter and feature enhancement extractor,to eliminate noise information generated by information fusion and recalibrate information from different channels to improve the quality of deep *** the aspect ratio of the bounding box to alleviate the issue of specificity *** training and testing on the PCB defect dataset,our method achieved an average accuracy of 97.3%(mAP50)after multiple experiments,which is 4.1%higher than YOLOv5-S,with an average accuracy of 97.6%and an Frames Per Second of *** comparative analysis also proves the superior performance and feasibility of YOLO-RLC in PCB defect detection.
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in...
详细信息
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingt
With the rapid expansion of interactions across various domains such as knowledge graphs and social networks, anomaly detection in dynamic graphs has become increasingly critical for mitigating potential risks. Howeve...
详细信息
Generative conversational agents, driven by large language models, have gained widespread popularity. However, a significant drawback lies in their tendency to produce uncontrollable and unpredictable contents, thereb...
详细信息
Texture is a fundamental component of computer graphics. Virtual texture technology is essential for facilitating large-scale texture loading and real-time rendering of natural terrain. To address the limitations pose...
详细信息
The core of the Knowledge Graph Completion (KGC) task is to predict and complete the missing relations or nodes in a KG. Common KGC tasks are mostly about inferring unknown elements with one or two elements being know...
详细信息
The research field of computer vision has recently taken an interest in the active computer vision problem of masked face recognition due to the COVID-19 pandemic. The use of face masks as a preventative measure again...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open ...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open wireless channel and limited resources of sensors bring security *** ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)*** could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in *** PKI is suited for the server because it is widely used on the ***,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor *** construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single *** the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most *** to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively.
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a...
详细信息
Most existing multi-objective evolutionary algorithms (MOEAs) have difficulties in approximating the whole Pareto Fronts with complicated geometries. However, the decision maker (DM) may only be interested in a small ...
暂无评论