2022
DOI: 10.1016/j.neucom.2021.04.140
|View full text |Cite
|
Sign up to set email alerts
|

Neurocomputing for internet of things: Object recognition and detection strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…If the color of the moving target is relatively rich and the pixel value change time is too short, it will cause the target to be mistaken for the background. At this time, it is necessary to The value is controlled within 5-20, and the P-value is positively correlated with the detection effect, but if If the value is too large, the response speed of the indicator will slow down [8,9]. After obtaining the stability through Equation 3.7, the judgment threshold Rth is obtained as:…”
Section: Modeling Methodsmentioning
confidence: 99%
“…If the color of the moving target is relatively rich and the pixel value change time is too short, it will cause the target to be mistaken for the background. At this time, it is necessary to The value is controlled within 5-20, and the P-value is positively correlated with the detection effect, but if If the value is too large, the response speed of the indicator will slow down [8,9]. After obtaining the stability through Equation 3.7, the judgment threshold Rth is obtained as:…”
Section: Modeling Methodsmentioning
confidence: 99%
“…As presented in equations ( 6), (7), where z indicates the actual audio. D z is the expectation operator applied to the original audio clips.…”
Section: Loss Functionmentioning
confidence: 99%
“…An encoded message can be disguised in a cover, such as a clip, image or audio recording [6]. Covert communication might be made possible through the stego, a covert data storage device [7]. A wide range of multimedia security situations, such as privacy protection, has been aided by steganography's use [8].…”
Section: Introductionmentioning
confidence: 99%
“…With the development of modern integration technologies and hardware devices, the recognition and detection of mobile and static objects have more and more application scenarios. In the literature [16], a convolutional neural network target image recognition algorithm combined with 5G technology is proposed for mobile objects in the Internet of Things, effectively improving the recognition accuracy of target detection. The literature [17] incorporated 3D convolutional layers into convolutional neural networks to solve the problem of recognizing moving objects by extracting spatio-temporal features, and the experimental results showed that the model helps extract more representative features.…”
Section: Introductionmentioning
confidence: 99%