Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a...
详细信息
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challengin...
详细信息
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challenging to collect defective ***,the complex surface background of polysilicon cell wafers complicates the accurate identification and localization of defective *** paper proposes a novel Lightweight Multiscale Feature Fusion network(LMFF)to address these *** network comprises a feature extraction network,a multi-scale feature fusion module(MFF),and a segmentation ***,a feature extraction network is proposed to obtain multi-scale feature outputs,and a multi-scale feature fusion module(MFF)is used to fuse multi-scale feature information *** order to capture finer-grained multi-scale information from the fusion features,we propose a multi-scale attention module(MSA)in the segmentation network to enhance the network’s ability for small target ***,depthwise separable convolutions are introduced to construct depthwise separable residual blocks(DSR)to reduce the model’s parameter ***,to validate the proposed method’s defect segmentation and localization performance,we constructed three solar cell defect detection datasets:SolarCells,SolarCells-S,and *** and SolarCells-S are monocrystalline silicon datasets,and PVEL-S is a polycrystalline silicon *** results show that the IOU of our method on these three datasets can reach 68.5%,51.0%,and 92.7%,respectively,and the F1-Score can reach 81.3%,67.5%,and 96.2%,respectively,which surpasses other commonly usedmethods and verifies the effectiveness of our LMFF network.
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communi...
详细信息
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communicating with *** tracking(ET)has become a useful method to detect *** vital aspect of moral erudition is the aptitude to have common visual *** eye-tracking approach offers valuable data regarding the visual behavior of children for accurate and early ***-tracking data can offer insightful information about the behavior and thought processes of people with ASD,but it is important to be aware of its limitations and to combine it with other types of data and assessment techniques to increase the precision of ASD *** operates by scanning the paths of eyes for extracting a series of eye projection points on images for examining the behavior of children with *** purpose of this research is to use deep learning to identify autistic disorders based on eye *** Chaotic Butterfly Optimization technique is used to identify this specific ***,this study develops an ET-based Autism Spectrum Disorder Diagnosis using Chaotic Butterfly Optimization with Deep Learning(ETASD-CBODL)*** presented ETASDCBODL technique mainly focuses on the recognition of ASD via the ET and DL *** accomplish this,the ETASD-CBODL technique exploits the U-Net segmentation technique to recognize interested *** addition,the ETASD-CBODL technique employs Inception v3 feature extraction with CBO algorithm-based hyperparameter ***,the long-shorttermmemory(LSTM)model is exploited for the recognition and classification of *** assess the performance of the ETASD-CBODL technique,a series of simulations were performed on datasets from the figure-shared data *** experimental values of accuracy(99.29%),precision(98.78%),sensitivity(99.29%)and specificity(99.29%)showed a better perfo
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul...
详细信息
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security problems brought by the mobile *** for Android system,due to its open source nature,malicious applications continue to emerge,which greatly threatens the data security of ***,this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and *** conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption,storage overhead and *** experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process *** with the native system,the additional performance overhead is small.
Power load forecasting is essential for optimizing power generation and distribution efficiency. This paper proposes a novel method for daily average load forecasting, referred to as LARSI-TPE-XGB, which integrates th...
详细信息
Web-services have become most common IT enablers today. Cyber attacks such as the distributed denial of service (DDoS) attacks pose availability concerns which may result into service outages and consequently financia...
详细信息
Efficient highway lighting is crucial for ensuring road safety and reducing energy consumption and costs. Traditional highway lighting systems rely on timers or simple photosensors, leading to inefficient operation by...
详细信息
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin...
详细信息
暂无评论