{"id":"https://openalex.org/W7105855140","doi":"https://doi.org/10.1109/access.2025.3633664","title":"YOLO-FES: An Improved Elephant Intrusion Detector Based on YOLOv8n","display_name":"YOLO-FES: An Improved Elephant Intrusion Detector Based on YOLOv8n","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7105855140","doi":"https://doi.org/10.1109/access.2025.3633664"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3633664","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3633664","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3633664","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Muhammad Danial Mohamad Rizwan","orcid":"https://orcid.org/0009-0000-8458-0409"},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Muhammad Danial Mohamad Rizwan","raw_affiliation_strings":["Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia"],"raw_orcid":"https://orcid.org/0009-0000-8458-0409","affiliations":[{"raw_affiliation_string":"Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Md. Akbar Hossain","orcid":"https://orcid.org/0000-0002-4886-8349"},"institutions":[{"id":"https://openalex.org/I127108677","display_name":"Eastern Institute of Technology","ror":"https://ror.org/00ct9cz38","country_code":"NZ","type":"education","lineage":["https://openalex.org/I127108677","https://openalex.org/I4387152882"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Md. Akbar Hossain","raw_affiliation_strings":["School of Computing, Eastern Institute of Technology, Napier, New Zealand"],"raw_orcid":"https://orcid.org/0000-0002-4886-8349","affiliations":[{"raw_affiliation_string":"School of Computing, Eastern Institute of Technology, Napier, New Zealand","institution_ids":["https://openalex.org/I127108677"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Athirah Najihah Zulkifili","orcid":"https://orcid.org/0009-0006-2675-2894"},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Athirah Najihah Zulkifili","raw_affiliation_strings":["Faculty of Manufacturing and Mechatronic Engineering Technology, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia"],"raw_orcid":"https://orcid.org/0009-0006-2675-2894","affiliations":[{"raw_affiliation_string":"Faculty of Manufacturing and Mechatronic Engineering Technology, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jalal Uddin Md Akbar","orcid":null},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Jalal Uddin Md Akbar","raw_affiliation_strings":["Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lavindar Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I118271192","display_name":"Western Digital (Japan)","ror":"https://ror.org/0521k5n17","country_code":"JP","type":"company","lineage":["https://openalex.org/I118271192","https://openalex.org/I4210121352"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Lavindar Singh","raw_affiliation_strings":["Satok Bridge Digital Sdn. Bhd., TEGAS Digital Village, Kuching, Sarawak, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Satok Bridge Digital Sdn. Bhd., TEGAS Digital Village, Kuching, Sarawak, Malaysia","institution_ids":["https://openalex.org/I118271192"]}]},{"author_position":"last","author":{"id":null,"display_name":"Syafiq Fauzi Kamarulzaman","orcid":"https://orcid.org/0000-0002-1857-4120"},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Syafiq Fauzi Kamarulzaman","raw_affiliation_strings":["Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia"],"raw_orcid":"https://orcid.org/0000-0002-1857-4120","affiliations":[{"raw_affiliation_string":"Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I102913810"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63077456,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"196299","last_page":"196313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.38600000739097595,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.38600000739097595,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11665","display_name":"Animal Vocal Communication and Behavior","score":0.15780000388622284,"subfield":{"id":"https://openalex.org/subfields/1309","display_name":"Developmental Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12644","display_name":"Wildlife-Road Interactions and Conservation","score":0.09099999815225601,"subfield":{"id":"https://openalex.org/subfields/2303","display_name":"Ecology"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7892000079154968},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5540000200271606},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5447999835014343},{"id":"https://openalex.org/keywords/object-detection","display_name":"Object detection","score":0.5223000049591064},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.47269999980926514},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4593000113964081},{"id":"https://openalex.org/keywords/ranging","display_name":"Ranging","score":0.42730000615119934},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.42410001158714294},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3919000029563904}],"concepts":[{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7892000079154968},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.761900007724762},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5540000200271606},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5447999835014343},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.5223000049591064},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.47269999980926514},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4593000113964081},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4487999975681305},{"id":"https://openalex.org/C115051666","wikidata":"https://www.wikidata.org/wiki/Q6522493","display_name":"Ranging","level":2,"score":0.42730000615119934},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.42410001158714294},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.36570000648498535},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34369999170303345},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3353999853134155},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.33340001106262207},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.33340001106262207},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3328000009059906},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3224000036716461},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31619998812675476},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.31150001287460327},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C2780757406","wikidata":"https://www.wikidata.org/wiki/Q465837","display_name":"Skyline","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C2993179017","wikidata":"https://www.wikidata.org/wiki/Q2278935","display_name":"Black spot","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2558000087738037}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3633664","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3633664","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:89facb6b02d04bfca3f65bd7bb8ad3d6","is_oa":true,"landing_page_url":"https://doaj.org/article/89facb6b02d04bfca3f65bd7bb8ad3d6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 196299-196313 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3633664","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3633664","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","score":0.4163672626018524,"display_name":"Responsible consumption and production"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Human\u2013elephant":[0],"conflict":[1],"(HEC)":[2],"poses":[3],"a":[4,51,70,94,109,187],"critical":[5],"threat":[6],"to":[7,88,146,175,199],"both":[8],"biodiversity":[9],"and":[10,20,59,92,121,136,142,155,190],"rural":[11],"livelihoods,":[12],"demanding":[13],"innovative":[14],"monitoring":[15],"solutions":[16],"that":[17,74,131],"are":[18],"accurate":[19,60],"deployable":[21,191],"in":[22,78],"resource-constrained":[23],"environments.":[24],"Existing":[25],"deep":[26],"learning":[27],"models":[28],"often":[29],"trade":[30],"off":[31],"detection":[32,54],"accuracy":[33,151],"for":[34,57,100,193],"computational":[35],"efficiency,":[36],"limiting":[37],"their":[38],"real-time":[39,162,194],"use":[40],"on":[41,108,171,178],"edge":[42],"devices.":[43],"To":[44],"address":[45],"this":[46],"challenge,":[47],"we":[48],"propose":[49],"YOLO-FES,":[50],"lightweight":[52],"object":[53],"model":[55,105,137],"tailored":[56],"efficient":[58],"elephant":[61,124,195],"intrusion":[62,196],"detection.":[63],"YOLO-FES":[64,132,185],"integrates":[65],"three":[66],"key":[67],"components:":[68],"(i)":[69],"FasterNet":[71],"block":[72],"(F)":[73],"replaces":[75],"bottleneck":[76],"blocks":[77],"the":[79],"backbone,":[80],"(ii)":[81],"an":[82],"Efficient":[83],"Multi-scale":[84],"Attention":[85],"(E)":[86],"module":[87],"enhance":[89],"feature":[90,102],"representation,":[91],"(iii)":[93],"Slim-neck":[95],"(S)":[96],"powered":[97],"by":[98,139],"GSConv":[99],"improved":[101],"fusion.":[103],"The":[104],"was":[106],"trained":[107],"diverse":[110],"dataset":[111],"comprising":[112],"trap":[113],"cameras,":[114],"CCTV,":[115],"drones,":[116],"mobile":[117],"phones,":[118],"television":[119],"footage,":[120],"supplemented":[122],"with":[123,152,164],"images":[125],"from":[126,168],"COCO2017.":[127],"Experimental":[128],"results":[129,183],"demonstrate":[130],"reduces":[133],"parameters,":[134],"FLOPs,":[135],"size":[138],"19%,":[140],"23.5%,":[141],"16.1%,":[143],"respectively,":[144],"compared":[145],"YOLOv8n,":[147],"while":[148],"achieving":[149],"higher":[150],"+1.5%":[153],"mAP@0.5":[154],"+1.2%":[156],"mAP@0.5\u20130.95.":[157],"Edge":[158],"deployment":[159],"evaluations":[160],"confirm":[161],"performance,":[163],"inference":[165],"times":[166],"ranging":[167],"24.7":[169],"ms":[170,177],"Jetson":[172],"Orin":[173],"Nano":[174],"254.2":[176],"Raspberry":[179],"Pi":[180],"4B.":[181],"These":[182],"establish":[184],"as":[186],"robust,":[188],"low-cost,":[189],"solution":[192],"detection,":[197],"contributing":[198],"sustainable":[200],"mitigation":[201],"of":[202],"human\u2013elephant":[203],"conflict.":[204]},"counts_by_year":[],"updated_date":"2025-11-23T05:10:03.516525","created_date":"2025-11-17T00:00:00"}
