With the rapid development of computer vision and deep learning technologies, object detection plays a crucial role in various fields. Due to the complexity and diversity of underwater environments, underwater vision ...
With the rapid development of computer vision and deep learning technologies, object detection plays a crucial role in various fields. Due to the complexity and diversity of underwater environments, underwater vision tasks face great challenges. In this paper, we improved the YOLOv8 detection model for the fish detection task in complex environments. Specifically, we proposed a multi-scale feature fusion method (MFANet) that combines multiscale weighted feature fusion with multiscale attention to efficiently capture multilevel features of fishes in complex environments. We designed a multiscale weighted feature fusion module that combines feature maps at different scales to enhance the model’s representation of the target. By introducing a multi-scale attention mechanism, the model is able to pay more attention to important feature regions. We conducted experiments on real underwater complex environment datasets. The results show that our proposed improved method significantly enhances the performance of the YOLOv8 model in fish detection tasks and lays a good foundation for subsequent underwater detection tasks.
Social media emerge as common platforms for knowledge sharing/exchange in online communities. Meanwhile, they also become a hotbed for the diffusion of misinformation. Content moderation is one of the measures for pre...
详细信息
Lung segmentation has become a bedrock in the effective diagnosis, and classification of coronavirus (COVID-19) from radiological images such as computed tomography (CT) and X-ray images. Since the coronavirus (COVID-...
详细信息
Cloud computing promises the advent of a new era of service boosted by means of virtualization *** process of virtualization means creation of virtual infrastructure,devices,servers and computing resources needed to d...
详细信息
Cloud computing promises the advent of a new era of service boosted by means of virtualization *** process of virtualization means creation of virtual infrastructure,devices,servers and computing resources needed to deploy an application *** extensively practiced technology involves selecting an efficient Virtual Machine(VM)to complete the task by transferring applications from Physical Machines(PM)to VM or from VM to *** whole process is very challenging not only in terms of computation but also in terms of energy and *** research paper presents an energy aware VM allocation and migration approach to meet the challenges faced by the growing number of cloud data *** Learning(ML)based Artificial Bee Colony(ABC)is used to rank the VM with respect to the load while considering the energy efficiency as a crucial *** most efficient virtual machines are further selected and thus depending on the dynamics of the load and energy,applications are migrated fromoneVMto *** simulation analysis is performed inMatlab and it shows that this research work results in more reduction in energy consumption as compared to existing studies.
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ...
详细信息
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and fast image encryption *** 1D chaotic maps offer a practical approach to real-time image encryption,their limited flexibility and increased vulnerability restrict their practical *** this research,we have utilized a 3DHindmarsh-Rosemodel to construct a secure *** randomness of the chaotic map is assessed through standard *** proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters,as well as ensuring a uniformdistribution of chaotic signals across the entire value ***,a fast image encryption technique utilizing the new chaotic system is *** novelty of the approach is confirmed through time complexity *** further strengthen the resistance against cryptanalysis attacks and differential attacks,the SHA-256 algorithm is employed for secure key *** results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach,highlighting its exceptional suitability for secure ***,the security of the proposed scheme has been compared with stateof-the-art image encryption schemes,and all comparison metrics indicate the superior performance of the proposed scheme.
U.S. Federal Trade Commission data for 2020-2022 shows that 23% of all fraud reports include Text as the contact method, with reported losses in the same period rising 279%, to $326 million. These numbers, and estimat...
详细信息
The objective of this paper is to critically examine the publication's trends and research landscape on the Internet of Things and Machine Learning (Io T-ML) research through bibliometric analysis (BA). The Elsevi...
详细信息
The rapid proliferation of real-time Internet of Things (IoT) devices has increased the need for efficient and accurate security mechanisms. Real-time IoT devices are highly vulnerable to cyberattacks due to their con...
详细信息
In this paper, we propose a novel hardening technique against Single Event Effects, which enables high-frequency operation and does not cause large power consumption and area overhead. The protection is based on redun...
详细信息
From smart homes to industrial automation, the efficiency and connectivity of many applications have been greatly improved by the fast expansion of the Internet of Things (IoT) and Cyber-Physical systems (CPS). Sophis...
详细信息
暂无评论