The security of industrial networks, particularly in industrial automation systems, is critical for ensuring system reliability and protecting sensitive data. This paper proposes a deeper anomaly detection system usin...
详细信息
Electrolysis tanks are used to smeltmetals based on electrochemical principles,and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures,thus affecting normal **...
详细信息
Electrolysis tanks are used to smeltmetals based on electrochemical principles,and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures,thus affecting normal *** at the problems of time-consuming and poor accuracy of existing infrared methods for high-temperature detection of dense pole plates in electrolysis tanks,an infrared dense pole plate anomalous target detection network YOLOv5-RMF based on You Only Look Once version 5(YOLOv5)is ***,we modified the Real-Time Enhanced Super-Resolution Generative Adversarial Network(Real-ESRGAN)by changing the U-shaped network(U-Net)to Attention U-Net,to preprocess the images;secondly,we propose a new Focus module that introduces the Marr operator,which can provide more boundary information for the network;again,because Complete Intersection over Union(CIOU)cannot accommodate target borders that are increasing and decreasing,replace CIOU with Extended Intersection over Union(EIOU),while the loss function is changed to Focal and Efficient IOU(Focal-EIOU)due to the different difficulty of sample *** the homemade dataset,the precision of our method is 94%,the recall is 70.8%,and the map@.5 is 83.6%,which is an improvement of 1.3%in precision,9.7%in recall,and 7%in map@.5 over the original *** algorithm can meet the needs of electrolysis tank pole plate abnormal temperature detection,which can lay a technical foundation for improving production efficiency and reducing production waste.
This article presents LoRaDIP, a novel low-light image enhancement (LLIE) model based on deep image priors (DIPs). While DIP-based enhancement models are known for their zero-shot learning, their expensive computation...
详细信息
In remote sensing image segmentation, data imbalance remains a critical challenge, particularly in datasets from networks and natural scenes, increasing task complexity. Recent studies have explored adversarial traini...
详细信息
Safety equipment detection is an important application of object detection, receiving widespread attention in fields such as smart construction sites and video surveillance. Significant progress has been made in objec...
详细信息
Current automatic segment extraction techniques for identifying target characters in videos have several limitations, including low accuracy, slow processing speeds, and poor adaptability to diverse scenes. This paper...
详细信息
Handling the massive amount of data generated by Smart Mobile Devices(SMDs)is a challenging computational *** Computing is an emerging computation paradigm that is employed to conquer this *** can bring computation po...
详细信息
Handling the massive amount of data generated by Smart Mobile Devices(SMDs)is a challenging computational *** Computing is an emerging computation paradigm that is employed to conquer this *** can bring computation power closer to the end devices to reduce their computation latency and energy ***,this paradigm increases the computational ability of SMDs by collaboration with edge *** is achieved by computation offloading from the mobile devices to the edge nodes or ***,not all applications benefit from computation offloading,which is only suitable for certain types of *** properties,SMD capability,wireless channel state,and other factors must be counted when making computation offloading ***,optimization methods are important tools in scheduling computation offloading tasks in Edge Computing *** this paper,we review six types of optimization methods-they are Lyapunov optimization,convex optimization,heuristic techniques,game theory,machine learning,and *** each type,we focus on the objective functions,application areas,types of offloading methods,evaluation methods,as well as the time complexity of the proposed *** discuss a few research problems that are still *** purpose for this review is to provide a concise summary that can help new researchers get started with their computation offloading researches for Edge Computing networks.
In the fields of softwareengineering, the maintenance phase takes the most effort. software Module Clustering (SMC), as a part of reverse engineering, is used for the purpose of creating structural models from the so...
详细信息
Text-to-SQL is a natural language processing task focused on translating natural language queries into Structured Query Language (SQL), aiming to facilitate interaction between non-technical users and relational datab...
详细信息
Code reviews are an integral part of software development and have been recognized as a crucial practice for minimizing bugs and favouring higher code quality. They serve as an important checkpoint before committing c...
详细信息
暂无评论