Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven *** this way,the image quality and contrast will *** this case,It is difficult to detect the target in the image by the uni...
详细信息
Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven *** this way,the image quality and contrast will *** this case,It is difficult to detect the target in the image by the universal detection ***,a dual subnet based on multi-task collaborative training(DSMCT)is proposed in this ***,in the training phase,the Gated Context Aggregation Network(GCANet)is used as the supervisory network of YOLOX to promote the extraction of clean information in foggy *** the test phase,only the YOLOX branch needs to be activated to ensure the detection speed of the ***,the deformable convolution module is used to improve GCANet to enhance the model’s ability to capture details of non-homogeneous ***,the Coordinate Attention mechanism is introduced into the Vision Transformer and the backbone network of YOLOX is *** this way,the feature extraction ability of the network for deep-level information can be *** experimental results on artificial fog data set FOG_VOC and real fog data set RTTS show that the map value of DSMCT reached 86.56%and 62.39%,respectively,which was 2.27%and 4.41%higher than the current most advanced detection *** DSMCT network has high practicality and effectiveness for target detection in real foggy scenes.
It is difficult to comprehend and categorize human movements in Human Activity Recognition. Despite being widely utilized, convolutional neural networks (CNN) might not adequately represent the intricacy of motions. T...
详细信息
Domain Name System (DNS) is the critical backbone of the internet, translating human-readable domain names into machine-readable IP addresses. DDoS attacks are a type of distributed denial-of-service (DDoS) attacks wh...
详细信息
GUI (Graphical User Interface) programming is the process of developing (coding) a graphical interface application. GUI-based application, which replaces TUI (Textual User Interface), allows users to interact with a p...
详细信息
As VR becomes more immersive and widespread, the fact that it collects vast amounts of personal and sensitive data from users, have raised concerns about how this information is managed and protected. This paper delve...
详细信息
Diabetes Mellitus is a chronic, multifactorial syndrome related to defective insulin secretion or its action. This can be considered a disease of all people in the world;hence, early detection of this disease will pro...
详细信息
Deterministic delivery of scheduled traffic (ST) is critical in time-sensitive networking (TSN). The time-aware shaper (TAS) defined by IEEE 802.1Qbv is the enabler to ensure deterministic end-to-end delays of ST flow...
详细信息
There are many cases where borrowed money by debtors is not returned. It is because the company misjudged in determining the risk of lending. Thus, debtors cannot repay their debts and end up in losses on the company&...
详细信息
Nowadays, the development of digital information volume is growing rapidly, thus creating new challenges in data processing in educational institutions. One of the data that will always increase every year is thesis, ...
详细信息
This research explores the application and performance comparison of various machine learning for movie ratings. This study aims to make a comprehensive comparison in performance between various machine learning model...
详细信息
暂无评论