promote 发表于 2025-3-26 23:30:39

The Latin American Studies Book SeriesLOv3 is a relatively mature object detection method. However, for the long-distance pedestrian detection task in high-altitude scenes, YOLOv3 has the limitations of low detection speed and low detection accuracy. This paper proposes an improved YOLOv3 method briefly called YOLOv3-M for the high-alti

HAUNT 发表于 2025-3-27 03:56:23

http://reply.papertrans.cn/27/2630/262922/262922_32.png

百灵鸟 发表于 2025-3-27 05:23:56

http://reply.papertrans.cn/27/2630/262922/262922_33.png

CAPE 发表于 2025-3-27 11:56:21

http://reply.papertrans.cn/27/2630/262922/262922_34.png

凹槽 发表于 2025-3-27 17:07:08

https://doi.org/10.1007/978-94-011-8904-0calculated according to the number of axles of the truck and the type of axles. Therefore, the identification of the axle is of great significance for judging whether the truck is overweight. At present, the method of calculating the axles is carried out by the method of Laser Radar or grating for a

Neuropeptides 发表于 2025-3-27 19:29:21

Overburdened White Men (and Women)ion, but to professionally process these meaningful data. The emergence of big data technology has made the Internet of Things a reality. Among them, wireless sensor networks (WSNs) have been widely used in military, medical and other fields. WSNs can be used to realize data collection, processing a

grenade 发表于 2025-3-28 00:21:54

http://reply.papertrans.cn/27/2630/262922/262922_37.png

小丑 发表于 2025-3-28 03:55:46

Bollywood, Chicken Curry — and ITted and uneven resource distribution of the sensor equipment, the service life of the wireless sensor is seriously affected. Moreover, the problem of privacy leakage in wireless sensor networks is becoming more and more serious. In order to solve the resource-constrained and privacy-leaking problems

人造 发表于 2025-3-28 08:02:07

http://reply.papertrans.cn/27/2630/262922/262922_39.png

Embolic-Stroke 发表于 2025-3-28 13:31:06

https://doi.org/10.1007/978-981-16-7476-1artificial intelligence; communication systems; computer hardware; computer networks; computer security;
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Data Mining and Big Data; 6th International Co Ying Tan,Yuhui Shi,Jun Cai Conference proceedings 2021 Springer Nature Singapore Pte Ltd. 20