|
|
|
Mohammed Imran Basheer Ahmed, Rim Zaghdoud, Mohammed Salih Ahmed, Razan Sendi, Sarah Alsharif, Jomana Alabdulkarim, Bashayr Adnan Albin Saad, Reema Alsabt, Atta Rahman and Gomathi Krishnasamy
To constructively ameliorate and enhance traffic safety measures in Saudi Arabia, a prolific number of AI (Artificial Intelligence) traffic surveillance technologies have emerged, including Saher, throughout the past years. However, rapidly detecting a v...
ver más
|
|
|
|
|
|
|
Alireza Saberironaghi, Jing Ren and Moustafa El-Gindy
Over the last few decades, detecting surface defects has attracted significant attention as a challenging task. There are specific classes of problems that can be solved using traditional image processing techniques. However, these techniques struggle wi...
ver más
|
|
|
|
|
|
|
Yao-Liang Chung
Against the backdrop of rising road traffic accident rates, measures to prevent road traffic accidents have always been a pressing issue in Taiwan. Road traffic accidents are mostly caused by speeding and roadway obstacles, especially in the form of rock...
ver más
|
|
|
|
|
|
|
Dweepna Garg, Priyanka Jain, Ketan Kotecha, Parth Goel and Vijayakumar Varadarajan
In recent years, face detection has achieved considerable attention in the field of computer vision using traditional machine learning techniques and deep learning techniques. Deep learning is used to build the most recent and powerful face detection alg...
ver más
|
|
|
|
|
|
|
Chuandong Zhang, Huali Ding, Qinfeng Shi and Yunfei Wang
Due to differences in planting environment, color, shape, size, and compactness, accurate detection of grape clusters is very difficult. Herein, a real-time detection method for grape clusters based on the YOLOv5s deep learning algorithm was proposed. Mo...
ver más
|
|
|
|
|
|
|
Erion-Vasilis Pikoulis, Zafeiria-Marina Ioannou, Mersini Paschou and Evangelos Sakkopoulos
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting b...
ver más
|
|
|
|
|
|
|
Haidi Zhu, Haoran Wei, Baoqing Li, Xiaobing Yuan and Nasser Kehtarnavaz
Although there are well established object detection methods based on static images, their application to video data on a frame by frame basis faces two shortcomings: (i) lack of computational efficiency due to redundancy across image frames or by not us...
ver más
|
|
|
|
|
|
|
Karol Krzempek
Photothermal spectroscopy (PTS) is a technique used for determining the composition of liquids, solids and gases. In PTS, the sample is illuminated with a radiation source, and the thermal response of the analyte (e.g., refractive index) is analyzed to g...
ver más
|
|
|
|
|
|
|
Satyabrata Aich, Sabyasachi Chakraborty, Jong-Seong Sim, Dong-Jin Jang and Hee-Cheol Kim
The safety and welfare of companion animals such as dogs has become a large challenge in the last few years. To assess the well-being of a dog, it is very important for human beings to understand the activity pattern of the dog, and its emotional behavio...
ver más
|
|
|
|
|
|
|
Ping Zhou, Gongbo Zhou, Zhencai Zhu, Zhenzhi He, Xin Ding and Chaoquan Tang
As an important load-bearing component, steel wire ropes (WRs) are widely used in complex systems such as mine hoists, cranes, ropeways, elevators, oil rigs, and cable-stayed bridges. Non-destructive damage detection for WRs is an important way to assess...
ver más
|
|
|
|
|
|
|
Halil Murat Ünver, Yunus Kökver, Elvan Duman and Osman Ayhan Erdem
Accurate and efficient localization of the optic disk (OD) in retinal images is an essential process for the diagnosis of retinal diseases, such as diabetic retinopathy, papilledema, and glaucoma, in automatic retinal analysis systems. This paper present...
ver más
|
|
|
|
|
|
|
Merv Fingas and Carl E. Brown
The response to a major oil spill can be challenging in temperate climates and with good weather conditions. By contrast, a major spill in or under ice and snow, presents a whole new series of challenges. This paper reviews detection technologies for the...
ver más
|
|
|
|
|
|
|
Yuanxun Zheng, Shaoqiang Wang, Peng Zhang, Tongxin Xu and Jingbo Zhuo
The development and application of nondestructive testing technology for prestressed reinforced concrete structures in the field of infrastructure construction were summarized in this study via the analysis of relevant literature worldwide. The detection...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Hongdan Liu, Yan Liu, Bing Li and Zhigang Qi
Ship abnormal behavior detection is an essential part of maritime supervision. It can assist maritime departments to conduct real-time supervision on a certain sea area, avoid ship risks, and improve the efficiency of sea area supervision. Given the prob...
ver más
|
|
|
|
|
|
|
Han Li, Yiqun Dong, Yunxiao Liu and Jianliang Ai
In recent years, unmanned aerial vehicles (UAV) have been increasingly used in power line inspections. Birds often nest on transmission line towers, which threatens safe power line operation. The existing research on bird?s nest inspection using UAVs mai...
ver más
|
|
|
|
|
|
|
Jinsoo Kim and Jeongho Cho
To construct a safe and sound autonomous driving system, object detection is essential, and research on fusion of sensors is being actively conducted to increase the detection rate of objects in a dynamic environment in which safety must be secured. Rece...
ver más
|
|
|
|
|
|
|
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec...
ver más
|
|
|
|
|
|
|
Huaiwen Wang, Jianguo Feng and Honghuan Yin
Images captured using unmanned aerial vehicles (UAVs) often exhibit dense target distribution and indistinct features, which leads to the issues of missed detection and false detection in target detection tasks. To address these problems, an improved met...
ver más
|
|
|
|