首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   1篇
金属工艺   1篇
轻工业   3篇
无线电   2篇
一般工业技术   30篇
自动化技术   24篇
  2023年   9篇
  2022年   11篇
  2021年   21篇
  2020年   1篇
  2019年   1篇
  2018年   2篇
  2017年   2篇
  2016年   1篇
  2015年   2篇
  2014年   2篇
  2013年   2篇
  2012年   3篇
  2008年   1篇
  2005年   2篇
排序方式: 共有60条查询结果,搜索用时 31 毫秒
1.
Abandoned and stolen object detection is a challenging task due to occlusion, changes in lighting, large perspective distortion, and the similarity in appearance of different people. This paper presents real-time detection methods of abandoned and stolen objects in a complex video. The adaptive background modeling method is applied to stable tracking and the ghost image removing. To detect abandoned and stolen objects, the methods determine spatio-temporal relationship between moving people and suspicious drops. The space first detection method measures the distance between a moving object and a non-moving object in spatial change analysis. The time first detection method conducts temporal change analysis and then spatial change analysis. The potential abandoned object is classified as a definite abandoned or stolen object by two-level detection approach. The time-to-live timer is applied by adjusting several key parameters on each camera and environment. In experiments, we show the experimental results to evaluate our proposed methods using benchmark datasets.  相似文献   
2.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy.  相似文献   
3.
4.
The Journal of Supercomputing - The purpose of this study is to investigate gait in patients with neurological disorders using accelerometers. Accelerometers were placed on both ankles of...  相似文献   
5.
White blood cells (WBCs) are a vital part of the immune system that protect the body from different types of bacteria and viruses. Abnormal cell growth destroys the body’s immune system, and computerized methods play a vital role in detecting abnormalities at the initial stage. In this research, a deep learning technique is proposed for the detection of leukemia. The proposed methodology consists of three phases. Phase I uses an open neural network exchange (ONNX) and YOLOv2 to localize WBCs. The localized images are passed to Phase II, in which 3D-segmentation is performed using deeplabv3 as a base network of the pre-trained Xception model. The segmented images are used in Phase III, in which features are extracted using the darknet-53 model and optimized using Bhattacharyya separately criteria to classify WBCs. The proposed methodology is validated on three publically available benchmark datasets, namely ALL-IDB1, ALL-IDB2, and LISC, in terms of different metrics, such as precision, accuracy, sensitivity, and dice scores. The results of the proposed method are comparable to those of recent existing methodologies, thus proving its effectiveness.  相似文献   
6.
Artificial intelligence aids for healthcare have received a great deal of attention. Approximately one million patients with gastrointestinal diseases have been diagnosed via wireless capsule endoscopy (WCE). Early diagnosis facilitates appropriate treatment and saves lives. Deep learning-based techniques have been used to identify gastrointestinal ulcers, bleeding sites, and polyps. However, small lesions may be misclassified. We developed a deep learning-based best-feature method to classify various stomach diseases evident in WCE images. Initially, we use hybrid contrast enhancement to distinguish diseased from normal regions. Then, a pretrained model is fine-tuned, and further training is done via transfer learning. Deep features are extracted from the last two layers and fused using a vector length-based approach. We improve the genetic algorithm using a fitness function and kurtosis to select optimal features that are graded by a classifier. We evaluate a database containing 24,000 WCE images of ulcers, bleeding sites, polyps, and healthy tissue. The cubic support vector machine classifier was optimal; the average accuracy was 99%.  相似文献   
7.

One of the most significant disadvantages of the Internet of Things (IoT) is the overload of information. More information makes it harder to find valuable information. Recommendation systems identify the most suitable items for a given user. The recommended result is only valid if the system users know what they want, and clearly and explicitly convey their needs to the system. Because the role of a recommendation system is to calculate the similarity between the given request and each item, and to rank the similarity, the requests and identity of items should be clear to obtain correct results. However, in most situations in which recommendations are made, requests are implicit and ambiguous. A good recommendation system should make a reliable list of items, even with ambiguous requests. This paper proposes a model of generating recommendations for implicit requests. The model employs two methods that reveals the desire of the requestor and uses content curation with a customized layout to display the recommendations. The first method for revealing the requestor’s desire is to specify the implicit request by combining the user’s customized preference with the collective intelligence. The second method for employing content curation is to arrange the recommendation for users to accept spontaneously. To persuade users, the recommendations are transformed into a layout based on a personalized cognitive bias. Through these processes, reliable and beneficial recommendations can be provided to any user even if their requests are implicit or unclear.

  相似文献   
8.
Hookworm is an illness caused by an internal sponger called a roundworm. Inferable from deprived cleanliness in the developing nations, hookworm infection is a primary source of concern for both motherly and baby grimness. The current framework for hookworm detection is composed of hybrid convolutional neural networks; explicitly an edge extraction framework alongside a hookworm classification framework is developed. To consolidate the cylindrical zones obtained from the edge extraction framework and the trait map acquired into the hookworm scientific categorization framework, pooling layers are proposed. The hookworms display different profiles, widths, and bend directions. These challenges make it difficult for customized hookworm detection. In the proposed method, a contourlet change was used with the development of the Hookworm detection. In this study, standard deviation, skewness, entropy, mean, and vitality were used for separating the highlights of the each form. These estimations were found to be accurate. AdaBoost classifier was utilized to characterize the hookworm pictures. In this paper, the exactness and the territory under bend examination in identifying the hookworm demonstrate its scientific relevance.  相似文献   
9.
In this research, we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application, Instagram. This plugin extracts personal details from Instagram users, e.g., name, user name, mobile number, ID, direct text or audio, video, and picture messages exchanged between different Instagram users. While developing the plugin, we identified resources available in both Android and IOS-based devices holding key forensics artifacts. We highlighted the poor privacy scheme employed by Instagram. This work, has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed, and how the traces, as well as the URL links of visual messages, can be used to access the privacy of any Instagram user without any critical credential verification. We also employed the anti-forensics method on the Instagram Android’s application and were able to restore the application from the altered or corrupted database file, which any criminal mind can use to set up or trap someone else. The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones.  相似文献   
10.
Kim  Leeseon  Kim  Yunyoung  Kwon  Oran  Kim  Ji Yeon 《Food science and biotechnology》2017,26(4):1085-1091
Food Science and Biotechnology - The aim of this study was to investigate the protective effects of ethanol (EAP) and acidic ethanol extracts (AEAP) of astringent persimmon fruits (Diospyros kaki)...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号