Abstract: Few-shot domain-adaptive object detection (FSDAOD) aims to transfer knowledge from a source domain to a target domain with limited labeled data, which faces severe challenges in the field of ...
Abstract: With the widespread use of Internet services, the risk of cyber attacks has increased significantly. Existing anomaly-based network intrusion detection systems suffer from slow processing ...
Abstract: Vitamin deficiency is a widespread global health issue that affects millions, often leading to severe physiological and dermatological complications. Early detection is essential for timely ...
Abstract: Identification of PCB board defects early in the manufacturing process is crucial, as PCB quality control plays an important role in the electronics manufacturing industry. Defective PCBs ...
Abstract: To improve the precision of CT lung nodule detection, this paper presents a parallel fusion model based on CNN and Transformer network, which integrates features of the two networks to fully ...
Abstract: Early and precise detection of plant diseases is crucial for enhancing crop yield and minimizing agricultural losses. This paper evaluates the performance of deep learning-based ...
Abstract: Liability of lung cancer as a primary cancer mortality agent around the world makes it vital to create diagnostic systems that guarantee both accuracy and operational efficiency. This ...
Abstract: Small uncrewed autonmous vehicles (UAVs) equipped with deep learning models are increasingly used to detect small objects both on the ground and in aerial environments. Since small objects ...
Abstract: This research suggests a strong framework for automated malaria detection using a Convolutional Neural Network (CNN) model. The dataset, sourced from Kaggle, consists of 27,558 ...
Abstract: Hyperspectral anomaly detection (HAD) identifies anomalies by analyzing differences between anomalies and background pixels without prior information, presenting a significant challenge.
Abstract: Image steganography conceals secret data within a cover image to generate a new image (stego image) in a manner that makes the secret data undetectable. The main problem in image ...
Abstract: This research presents a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) model developed for malware classification from IoT devices in the SCADA system and for ...