Accurate plant detection is an important task in modern precision agriculture, enabling growers to quantify their plant numbers and estimate crop yields accurately. This paper looks at an example tobacco crop with a s...
详细信息
ISBN:
(数字)9798350364293
ISBN:
(纸本)9798350364309
Accurate plant detection is an important task in modern precision agriculture, enabling growers to quantify their plant numbers and estimate crop yields accurately. This paper looks at an example tobacco crop with a small dataset and aims to augment it to produce reliable object detection and counting. To obtain a trainable dataset, the source masks are separated into base classes, noise is removed from the masks, and images are augmented. The newly obtained clean dataset is then split into patches and used to obtain a JSON file describing all the labels present in the image. The model used for this job is YOLOv8 and it is trained on a COCO-formatted augmented dataset. Choosing the proper set of weights is done by evaluating and studying the performance metrics over the whole training phase, picking the one that offers the greatest balance between performance, training duration, and risk of induced overfitting due to over-learning.
Databases are the fundamental component of an application for storing data. SQL (Structured Query Language) is a query language that is used to create, read, update, and remove records in most relational databases (CR...
详细信息
This paper reviews the problems encountered with data sets recorded by IoT monitoring networks and proposes five data healing methods. The five proposed methods include classic approaches but also methods based on art...
详细信息
ISBN:
(数字)9798331532147
ISBN:
(纸本)9798331532154
This paper reviews the problems encountered with data sets recorded by IoT monitoring networks and proposes five data healing methods. The five proposed methods include classic approaches but also methods based on artificial intelligence algorithms for predicting values. Using a case study based on indoor air quality research, the performances of the five methods of filling the gaps in the recorded data are explored both from the point of view of the ease of evaluation and visualization of the data and from the point of view of the statistical properties of the series of values.
The automatic recognition of real people is particularly important in many fields of activity. The article proposes a complex system for recognizing people taking into account possible fraud attacks. A Long Short-Term...
详细信息
ISBN:
(数字)9798331518493
ISBN:
(纸本)9798331518509
The automatic recognition of real people is particularly important in many fields of activity. The article proposes a complex system for recognizing people taking into account possible fraud attacks. A Long Short-Term Memory neural network was used to detect possible frauds in the video sequences, and to recognize the person in the case after validation as a real person, two Siamese neural networks implemented with VGG 16 and ResNet 50 were tested. The obtained results were compared for Euclidean distance, Cosine distance, and for two training methods: Contrastive Loss and Triple Loss. The best results were obtained for VGG 16, Cosine distance, and Triple Loss.
One of the most important applications of UAVs is person detection for security or rescue tasks. The goal of the proposed paper is to develop, experiment, and compare the performance of two new neural networks based o...
详细信息
ISBN:
(数字)9798350369441
ISBN:
(纸本)9798350369458
One of the most important applications of UAVs is person detection for security or rescue tasks. The goal of the proposed paper is to develop, experiment, and compare the performance of two new neural networks based on the transformer architecture, Detection Transformer and Vision Transformer. Two datasets were used, an own one for testing and COCO for learning. The results are promising to take into account the difficulties of person detection at a distance.
The web applications security systems often use the authentication strategy and credentials to assess the identity of the user. Based on the credentials, the system is able to claim the identity of the user. Also, the...
详细信息
Natural Language Processing (NLP) models are one of the most promising topics nowadays. Applications like ChatGPT uncover the power of such models and their broad applications. However, developing such models requires...
详细信息
The market of Medical Devices has an annual growth rate perspective of 5.4% in the 2022 - 2028 period. The growth rate is mainly supported by the increased usage of devices for chronic diseases prevention and for remo...
详细信息
This paper discusses various applications of fractals in neurosciences and presents a methodology for their investigation and modeling with appropriate software. It is presented how to use multifractal analysis for ch...
This paper discusses various applications of fractals in neurosciences and presents a methodology for their investigation and modeling with appropriate software. It is presented how to use multifractal analysis for characterizing neural signals, with an emphasis on qualia fractality highlighted by the mechanisms proposed for its evaluation.
Internet of Things solutions typically involve interaction between sensors, actuators, the cloud, embedded systems and user applications. Often in such cases, there are time constraints specifying the maximum response...
详细信息
暂无评论