In the science of emotion processing, it is hard to figure out how to predict an emotion from naturalistic facial expressions in a multidimensional space. While many studies and works have been done to develop methods...
详细信息
Effective and efficient cyber incident handling is crucial for maintaining the security of information systems and organizational data. This research aims to develop a priority-based cyber incident handling method by ...
详细信息
Ensuring the safe navigation of autonomous vehicles in intelligent transportation system depends on their ability to detect pedestrians and vehicles. While transformer-based models for object detection have shown rema...
详细信息
Ensuring the safe navigation of autonomous vehicles in intelligent transportation system depends on their ability to detect pedestrians and vehicles. While transformer-based models for object detection have shown remarkable advancements, accurately identifying pedestrians and vehicles in adverse weather conditions remains a challenging task. Adverse weather introduces image quality degradation, leading to issues such as low contrast, reduced visibility, blurred edges, false detection, misdetection of tiny objects, and other impediments that further complicate the accuracy of detection. This paper introduces a novel Pedestrian and Vehicle Detection Model under adverse weather conditions, denoted as PVDM-YOLOv8l. In our proposed model, we first incorporate the Swin-Transformer method, which is designed for global extraction of feature of small objects to identify in poor visibility, into the YOLOv8l backbone structure. To enhance detection accuracy and address the impact of inaccurate features on recognition performance, CBAM is integrated between the neck and head networks of YOLOv8l, aiming to gather crucial information and obtain essential data. Finally, we adopted the loss function Wise-IOU v3. This function was implemented to mitigate the adverse effects of low-quality instances by minimizing negative gradients. Additionally, we enhanced and augmented the DAWN dataset and created a custom dataset, named DAWN2024, to cater to the specific requirements of our study. To verify the superiority of PVDM-YOLOV8l, its performance was compared against several commonly used object detectors, including YOLOv3, YOLOv3-tiny, YOLOv3-spp, YOLOv5, YOLOv6, and all the versions of YOLOv8 (n, m, s, l, and x) and some traditional models. The experimental results demonstrate that our proposed model achieved a 6.6%, 5.4%, 6%, and 5.1% improvement in precision, recall, F1-score and mean Average Precision (mAP) on the custom DAWN2024 dataset. This substantial improvement in accuracy ind
Can artists be recognized from the way they render certain materials, such as fabric, skin, or hair? In this paper, we study this problem with a focus on recognizing works by Rembrandt, Van Dyck, and other Dutch and F...
详细信息
The world's main grain crop is rice (Oryza sativa). It provides the majority of the world's population with nourishment and energy. Numerous rice leaf diseases are a major threat to the world's agricultura...
详细信息
Autonomous Robot Navigation in unknown and dynamic environments is considered one of the grand challenges in robotics. These motions that guide it span from rescue operations to planetary exploration. Classical method...
详细信息
Driver distraction has become a major concern for road safety as distracted driving is a leading cause of car accidents, resulting in a large number of injuries and fatalities every year. This project aims to address ...
详细信息
Exact solutions of the Routing, Modulation, and Spectrum Allocation (RMSA) problem in Elastic Optical Networks (EONs), so that the number of admitted demands is maximized while those of regenerators and frequency slot...
详细信息
This paper presents the algorithm and very-large-scale integration (VLSI) architecture of a high-throughput and highly efficient independent component analysis (ICA) processor for self-interference cancellation (SIC) ...
详细信息
In the era of expanding wireless sensor network (WSN) applications, safeguarding these networks against a spectrum of threats, including Denial-of-Service (DoS) attacks, is paramount. The innate resource limitations o...
详细信息
暂无评论