Applied Sciences-Basel最新文献

筛选
英文 中文
Enhancing Retail Transactions: A Data-Driven Recommendation Using Modified RFM Analysis and Association Rules Mining 增强零售交易:一种基于改进RFM分析和关联规则挖掘的数据驱动建议
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810057
Angela Hsiang-Ling Chen, Sebastian Gunawan
{"title":"Enhancing Retail Transactions: A Data-Driven Recommendation Using Modified RFM Analysis and Association Rules Mining","authors":"Angela Hsiang-Ling Chen, Sebastian Gunawan","doi":"10.3390/app131810057","DOIUrl":"https://doi.org/10.3390/app131810057","url":null,"abstract":"Retail transactions have become an integral part of the economic cycle of every country and even on a global scale. Retail transactions are a trade sector that has the potential to be developed continuously in the future. This research focused on building a specified and data-driven recommendation system based on customer-purchasing and product-selling behavior. Modified RFM analysis was used by adding two variables, namely periodicity and customer engagement index; clustering algorithm such as K-means clustering and Ward’s method; and association rules to determine the pattern of the cause–effect relationship on each transaction and four types of classifiers to apply and to validate the recommendation system. The results showed that based on customer behavior, it should be split into two groups: loyal and potential customers. In contrast, for product behavior, it also comprised three groups: bestseller, profitable, and VIP product groups. Based on the result, K-nearest neighbor is the most suitable classifier with a low chance of overfitting and a higher performance index.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45662579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Path Planning for Autonomous Vehicles in Unknown Dynamic Environment Based on Deep Reinforcement Learning 基于深度强化学习的未知动态环境下自动驾驶汽车路径规划
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810056
Hui Hu, Yuge Wang, Wenjie Tong, Jiao Zhao, Yulei Gu
{"title":"Path Planning for Autonomous Vehicles in Unknown Dynamic Environment Based on Deep Reinforcement Learning","authors":"Hui Hu, Yuge Wang, Wenjie Tong, Jiao Zhao, Yulei Gu","doi":"10.3390/app131810056","DOIUrl":"https://doi.org/10.3390/app131810056","url":null,"abstract":"Autonomous vehicles can reduce labor power during cargo transportation, and then improve transportation efficiency, for example, the automated guided vehicle (AGV) in the warehouse can improve the operation efficiency. To overcome the limitations of traditional path planning algorithms in unknown environments, such as reliance on high-precision maps, lack of generalization ability, and obstacle avoidance capability, this study focuses on investigating the Deep Q-Network and its derivative algorithm to enhance network and algorithm structures. A new algorithm named APF-D3QNPER is proposed, which combines the action output method of artificial potential field (APF) with the Dueling Double Deep Q Network algorithm, and experience sample rewards are considered in the experience playback portion of the traditional Deep Reinforcement Learning (DRL) algorithm, which enhances the convergence ability of the traditional DRL algorithm. A long short-term memory (LSTM) network is added to the state feature extraction network part to improve its adaptability in unknown environments and enhance its spatiotemporal sensitivity to the environment. The APF-D3QNPER algorithm is compared with mainstream deep reinforcement learning algorithms and traditional path planning algorithms using a robot operating system and the Gazebo simulation platform by conducting experiments. The results demonstrate that the APF-D3QNPER algorithm exhibits excellent generalization abilities in the simulation environment, and the convergence speed, the loss value, the path planning time, and the path planning length of the APF-D3QNPER algorithm are all less than for other algorithms in diverse scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48441487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks 基于识别的认证方法抗肩部冲浪攻击的系统文献综述
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810040
L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por
{"title":"Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks","authors":"L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por","doi":"10.3390/app131810040","DOIUrl":"https://doi.org/10.3390/app131810040","url":null,"abstract":"The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim’s actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the ef","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47735022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event-Sampled Adaptive Neural Course Keeping Control for USVs Using Intermittent Course Data 基于间歇航向数据的USV事件采样自适应神经航向保持控制
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810035
Hongyang Zhi, Baofeng Pan, Guibing Zhu
{"title":"Event-Sampled Adaptive Neural Course Keeping Control for USVs Using Intermittent Course Data","authors":"Hongyang Zhi, Baofeng Pan, Guibing Zhu","doi":"10.3390/app131810035","DOIUrl":"https://doi.org/10.3390/app131810035","url":null,"abstract":"This paper addresses the issue of course keeping control (CKC) for unmanned surface vehicles (USVs) under network environments, where various challenges, such as network resource constraints and discontinuities of course and yaw caused by data transmission, are taken into account. To tackle the issue of network resource constraints, an event-sampled scheme is developed to obtain the course data, and a novel event-sampled adaptive neural-network-based state observer (NN–SO) is developed to achieve the state reconstruction of discontinuous yaw. Using a backstepping design method, an event-sampled mechanism, and an adaptive NN–SO, an adaptive neural output feedback (ANOF) control law is designed, where the dynamic surface control technique is introduced to solve the design issue caused by the intermission course data. Moreover, an event-triggered mechanism (ETM) is established in a controller–actuator (C–A) channel and a dual-channel event-triggered adaptive neural output feedback control (ETANOFC) solution is proposed. The theoretical results show that all signals in the closed-loop control system (CLCS) are bounded. The effectiveness is verified through numerical simulations.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47027343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double-Constrained Consensus Clustering with Application to Online Anti-Counterfeiting 双约束一致性聚类及其在网上防伪中的应用
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810050
Claudio Carpineto, Giovanni Romano
{"title":"Double-Constrained Consensus Clustering with Application to Online Anti-Counterfeiting","authors":"Claudio Carpineto, Giovanni Romano","doi":"10.3390/app131810050","DOIUrl":"https://doi.org/10.3390/app131810050","url":null,"abstract":"Semi-supervised consensus clustering is a promising strategy to compensate for the subjectivity of clustering and its sensitivity to design factors, with various techniques being recently proposed to integrate domain knowledge and multiple clustering partitions. In this article, we present a new approach that makes double use of domain knowledge, namely to build the initial partitions, as well as to combine them. In particular, we show how to model and integrate must-link and cannot-link constraints into the objective function of a generic consensus clustering (CC) framework that maximizes the similarity between the consensus partition and the input partitions, which have, in turn, been enriched with the same constraints. In addition, borrowing from the theory of functional dependencies, the integrated framework exploits the notions of deductive closure and minimal cover to take full advantage of the logical implication between constraints. Using standard UCI benchmarks, we found that the resulting algorithm, termed CCC double-constrained consensus clustering), was more effective than plain CC at combining base-constrained partitions, with an average performance improvement of 5.54%. We then argue that CCC is especially well-suited for profiling counterfeit e-commerce websites, as constraints can be acquired by leveraging specific domain features, and demonstrate its potential for detecting affiliate marketing programs. Taken together, our experiments suggest that CCC makes the process of clustering more robust and able to withstand changes in clustering algorithms, datasets, and features, with a remarkable improvement in average performance.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47327134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Recommender Systems with Semantic User Profiling through Frequent Subgraph Mining on Knowledge Graphs 通过知识图的频繁子图挖掘,用语义用户评测增强推荐系统
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810041
Haemin Jung, Heesung Park, Kwangyon Lee
{"title":"Enhancing Recommender Systems with Semantic User Profiling through Frequent Subgraph Mining on Knowledge Graphs","authors":"Haemin Jung, Heesung Park, Kwangyon Lee","doi":"10.3390/app131810041","DOIUrl":"https://doi.org/10.3390/app131810041","url":null,"abstract":"Recommender systems play a crucial role in personalizing online user experiences by creating user profiles based on user–item interactions and preferences. Knowledge graphs (KGs) are intricate data structures that encapsulate semantic information, expressing users and items in a meaningful way. Although recent deep learning-based recommendation algorithms that embed KGs have demonstrated impressive performance, the richness of semantics and explainability embedded in the KGs are often lost due to the opaque nature of vector representations in deep neural networks. To address this issue, we propose a novel user profiling method for recommender systems that can encapsulate user preferences while preserving the original semantics of the KGs, using frequent subgraph mining. Our approach involves creating user profile vectors from a set of frequent subgraphs that contain information about user preferences and the strength of those preferences, measured by frequency. Subsequently, we trained a deep neural network model to learn the relationship between users and items, thereby facilitating effective recommendations using the neural network’s approximation ability. We evaluated our user profiling methodology on movie data and found that it demonstrated competitive performance, indicating that our approach can accurately represent user preferences while maintaining the semantics of the KGs. This work, therefore, presents a significant step towards creating more transparent and effective recommender systems that can be beneficial for a wide range of applications and readers interested in this field.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45018053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Calibration Method for Time Dimension and Space Dimension of Streak Tube Imaging Lidar 条纹管成像激光雷达时间维和空间维的标定方法
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810042
Zhaodong Chen, Fangfang Shao, Zhigang Fan, Xing-shun Wang, Chaowei Dong, Zhi-wei Dong, R. Fan, Deying Chen
{"title":"A Calibration Method for Time Dimension and Space Dimension of Streak Tube Imaging Lidar","authors":"Zhaodong Chen, Fangfang Shao, Zhigang Fan, Xing-shun Wang, Chaowei Dong, Zhi-wei Dong, R. Fan, Deying Chen","doi":"10.3390/app131810042","DOIUrl":"https://doi.org/10.3390/app131810042","url":null,"abstract":"Owing to the special working systems of streak tube imaging lidar (STIL), the time and space dimensions are coupled together on the streak images. This coupling can cause measurement errors in 3D point clouds and can make measurement results more complicated to calibrate than other kinds of lidars. This paper presents a method to generate a time calibration array and an angle calibration array to separate the offset of the streak into time dimension and space dimension. The time and space information of the signal at any position on the streak image can be indexed through these two arrays. A validation experiment on aircraft was carried out, and the range error of the 3D point cloud was improved from 0.41 m to 0.27 m using the proposed calibration method. Thus, using the proposed calibration method can improve the accuracy of the point cloud produced by STIL.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42561144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Singular Points of the Tremor of the Earth’s Surface 地球表面震颤的奇异点
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810060
Alexey Lyubushin
{"title":"Singular Points of the Tremor of the Earth’s Surface","authors":"Alexey Lyubushin","doi":"10.3390/app131810060","DOIUrl":"https://doi.org/10.3390/app131810060","url":null,"abstract":"A method for studying properties of the Earth’s surface tremor, measured by means of GPS, is proposed. The following tremor characteristics are considered: the entropy of wavelet coefficients, the Donoho–Johnston wavelet index, and two estimates of the spectral slope. The anomalous areas of tremor are determined by estimating the probability densities of extreme values of the studied properties. The criteria for abnormal tremor behavior are based on the proximity to, or the difference between, tremor properties and white noise. The greatest deviation from the properties of white noise is characterized by entropy minima and spectral slope and DJ index maxima. This behavior of the tremor is called “active”. The “passive” tremor behavior is characterized by the maximum proximity to the properties of white noise. The principal components approach provides weighted averaged density maps of these two variants of extreme distributions of parameters in a moving time window of 3 years. Singular points are the points of maximum average densities. The method is applied to the analysis of daily time series from a GPS network in California during the period 2009–2022. Singular points of tremor form well-defined clusters were found. The passive tremor could be caused by the activation of movement in fragments of the San Andreas fault.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48212287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Movement Time and Subjective Rating of Difficulty in Real and Virtual Pipe Transferring Tasks 真实和虚拟管道传输任务的移动时间和主观难度评定
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810043
Kaiway Li, Thi Lan Anh Nguyen
{"title":"Movement Time and Subjective Rating of Difficulty in Real and Virtual Pipe Transferring Tasks","authors":"Kaiway Li, Thi Lan Anh Nguyen","doi":"10.3390/app131810043","DOIUrl":"https://doi.org/10.3390/app131810043","url":null,"abstract":"An experiment was performed to investigate the movement time (MT) and subjective rating of difficulty for real and virtual pipe transferring tasks. Thirty adults joined as human participants. The HoloPipes app in a Microsoft® Hololens 2 augmented reality (AR) device was adopted to generate virtual pipes. The participants performed pipe transferring trials, from one location to another on a workbench, in both lateral and anterior–posterior directions. For the lateral transferring tasks, pipes in three diameters with three transferring distances and two origins were tested. For the anterior–posterior transferring tasks, pipes with a diameter of 2.2 cm with three transferring distances and two origins were tested. It was found that the MT of transferring a virtual pipe was significantly (p < 0.0001) shorter than that of transferring a real pipe. Moreover, male participants transferred the pipe significantly (p < 0.0001) faster than their female counterparts. Thus, the hypothesis that transferring a virtual pipe is less efficient than transferring a real pipe was rejected. It was also found that the MT of transferring both a real and a virtual object was dependent upon gender, handedness, and the transferring direction. In addition, the subjective rating of difficulty in pipe transferring is positively correlated (r = 0.48, p < 0.0001) with the MT. Based on Fitts’ law, additive MT models were proposed. These models could be used to predict the MT between handling real and virtual pipes under gender, handedness, and transferring direction conditions.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44630101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Tomato Disease and Pest Detection Method 番茄病虫害检测方法的研究
IF 2.7 4区 综合性期刊
Applied Sciences-Basel Pub Date : 2023-09-06 DOI: 10.3390/app131810063
Wenyi Hu, Wei Hong, Hongkun Wang, Meilin Liu, Shan Liu
{"title":"A Study on Tomato Disease and Pest Detection Method","authors":"Wenyi Hu, Wei Hong, Hongkun Wang, Meilin Liu, Shan Liu","doi":"10.3390/app131810063","DOIUrl":"https://doi.org/10.3390/app131810063","url":null,"abstract":"In recent years, with the rapid development of artificial intelligence technology, computer vision-based pest detection technology has been widely used in agricultural production. Tomato diseases and pests are serious problems affecting tomato yield and quality, so it is important to detect them quickly and accurately. In this paper, we propose a tomato disease and pest detection model based on an improved YOLOv5n to overcome the problems of low accuracy and large model size in traditional pest detection methods. Firstly, we use the Efficient Vision Transformer as the feature extraction backbone network to reduce model parameters and computational complexity while improving detection accuracy, thus solving the problems of poor real-time performance and model deployment. Second, we replace the original nearest neighbor interpolation upsampling module with the lightweight general-purpose upsampling operator Content-Aware ReAssembly of FEatures to reduce feature information loss during upsampling. Finally, we use Wise-IoU instead of the original CIoU as the regression loss function of the target bounding box to improve the regression prediction accuracy of the predicted bounding box while accelerating the convergence speed of the regression loss function. We perform statistical analysis on the experimental results of tomato diseases and pests under data augmentation conditions. The results show that the improved algorithm improves mAP50 and mAP50:95 by 2.3% and 1.7%, respectively, while reducing the number of model parameters by 0.4 M and the computational complexity by 0.9 GFLOPs. The improved model has a parameter count of only 1.6 M and a computational complexity of only 3.3 GFLOPs, demonstrating a certain advantage over other mainstream object detection algorithms in terms of detection accuracy, model parameter count, and computational complexity. The experimental results show that this method is suitable for the early detection of tomato diseases and pests.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43253967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信