An Enhanced Framework for Real-Time Dense Crowd Abnormal Behavior Detection Using YOLOv8

Academic Background With the increasing demand for public safety, especially during large-scale religious events such as the Hajj pilgrimage, abnormal behavior detection in dense crowds has become a critical issue. Existing detection methods often perform poorly under complex conditions such as occlusion, illumination variations, and uniform attire...

Gene Selection for Single Cell RNA-seq Data via Fuzzy Rough Iterative Computation Model

Background Introduction Single-cell RNA sequencing (scRNA-seq) technology has been widely applied in biomedical research in recent years, as it can reveal the heterogeneity of gene expression at the single-cell level, providing an important tool for understanding cell types, cell states, and disease mechanisms. However, scRNA-seq data is characteri...

Scalable Multi-Modal Representation Learning Networks

Academic Background In the field of artificial intelligence, Multi-modal Representation Learning (MMRL) is a powerful paradigm aimed at mapping inputs from different modalities into a shared representation space. For example, in social networks, users often share both images and text simultaneously. Through multi-modal representation learning, mode...

Dual Representation Learning for One-Step Clustering of Multi-View Data

In real-world applications, multi-view data is widely available. Multi-view data refers to data collected from multiple sources or through multiple representations, such as different language versions of the same news story or disease data obtained through different medical tests. Multi-view learning is an effective method for mining multi-view dat...

A Comprehensive Survey of Loss Functions and Metrics in Deep Learning

Deep Learning, as a crucial branch of artificial intelligence, has achieved significant progress in recent years across various fields such as computer vision and natural language processing. However, the success of deep learning largely depends on the choice of loss functions and performance metrics. Loss functions are used to measure the differen...

AI-Driven Job Scheduling in Cloud Computing: A Comprehensive Review

Academic Background With the rapid development of cloud computing technology, the demand for efficient job scheduling in dynamic and heterogeneous cloud environments has grown significantly. Traditional scheduling algorithms perform well in simple systems but are no longer sufficient for modern, complex cloud infrastructures. Issues such as resourc...

Pythagorean Linguistic Information-Based Green Supplier Selection Using Quantum-Based Group Decision-Making Methodology and the MULTIMOORA Approach

With the increasing severity of global environmental issues, companies are placing greater emphasis on green and sustainable development in supply chain management. Green Supply Chain Management (GSCM) has become a crucial means for enterprises to enhance competitiveness and achieve sustainable development. However, Green Supplier Selection (GSS) i...

A Comprehensive Review of Machine Learning Applications for Internet of Nano Things: Challenges and Future Directions

Academic Background In recent years, the rapid development of nanotechnology and the Internet of Things (IoT) has given rise to a revolutionary field—the Internet of Nano Things (IoNT). The IoNT connects nanoscale devices to the internet, enabling them to play significant roles in areas such as agriculture, military, multimedia, and healthcare. How...

Speech Emotion Recognition in Conversations Using Artificial Intelligence: A Systematic Review and Meta-Analysis

Academic Background Emotion Recognition is an important research direction in the fields of Artificial Intelligence (AI) and Affective Computing, with broad application prospects in areas such as healthcare, education, and Human-Computer Interaction (HCI). Speech, as a significant carrier of emotional expression, can convey rich emotional informati...

Challenges in Detecting Security Threats in WoT: A Systematic Literature Review

With the rapid development of the Internet of Things (IoT) and Web of Things (WoT), security issues have become increasingly prominent. In particular, the frequent occurrence of Denial of Service (DoS) attacks has made the security of WoT systems an urgent problem to be addressed. WoT achieves seamless connectivity between IoT devices and the inter...