Search alternatives:
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 381 - 400 results of 1,810 for search '((( resource OR resources) detection function ) OR ( source detection function ))', query time: 0.34s Refine Results
  1. 381
  2. 382

    Energy-Efficiency using Critical Nodes Detection Problem in Industrial Wireless Sensor Networks (IWSNs) by Karima MOULEY, Mohamed Amin TAHRAOUI, Abdelaziz KELLA

    Published 2025-03-01
    “…Experiments simulation validates our proposed approach, approving its efficiency in reducing significant energy consumption while preserving connectivity and functionality for industrial systems. Furthermore, the results highlight the potential of using critical node analysis to support sustainable and efficient operations in resource-constrained industrial environments. …”
    Get full text
    Article
  3. 383

    A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM by Shuroog Alsaleh, Mohamed El Bachir Menai, Saad Al-Ahmadi

    Published 2025-02-01
    “…Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and energy consumption) to function as conventional intrusion detection systems (IDSs). …”
    Get full text
    Article
  4. 384
  5. 385
  6. 386

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  7. 387

    YOLO11m-SCFPose: An Improved Detection Framework for Keypoint Extraction in Cucumber Fruit Phenotyping by Huijiao Yu, Xuehui Zhang, Jun Yan, Xianyong Meng

    Published 2025-07-01
    “…The Focaler-IoU loss function is employed to improve keypoint localization accuracy. …”
    Get full text
    Article
  8. 388
  9. 389

    Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture by Bekir Eray Katı, Ecir Uğur Küçüksille, Güncel Sarıman

    Published 2025-01-01
    “…The model’s performance was compared with other methods evaluated on the DFDC dataset, highlighting its efficiency in resource utilization and overall effectiveness. The findings reveal that the proposed QTL-CaiT-based system provides a strong foundation for deepfake detection and contributes significantly to the academic literature. …”
    Get full text
    Article
  10. 390

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article
  11. 391

    Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring by Kaitlin J. Palmer, Sam Tabbutt, Douglas Gillespie, Jesse Turner, Paul King, Dominic Tollit, Jessica Thompson, Jason Wood

    Published 2022-11-01
    “…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
    Get full text
    Article
  12. 392
  13. 393

    CSW-YOLO: A traffic sign small target detection algorithm based on YOLOv8. by Qian Shen, Yi Li, YuXiang Zhang, Lei Zhang, ShiHao Liu, Jinhua Wu

    Published 2025-01-01
    “…First, the bottleneck of the C2f module in the original yolov8 network is replaced with the residual Faster-Block module in FasterNet, and then the new channel mixer convolution GLU (CGLU) in TransNeXt is combined with it to construct the C2f-faster-CGLU module, reducing the number of model parameters and computational load; Secondly, the SPPF module is combined with the large separable kernel attention (LSKA) to construct the SPPF-LSKA module, which greatly enhances the feature extraction ability of the model; Then, by adding a small target detection layer, the accuracy of small target detection such as traffic signs is greatly improved; Finally, the Inner-IoU and MPDIoU loss functions are integrated to construct WISE-Inner-MPDIoU, which replaces the original CIoU loss function, thereby improving the calculation accuracy. …”
    Get full text
    Article
  14. 394

    DECISION TREE WITH HILL CLIMBING ALGORITHM BASED SPECTRUM HOLE DETECTION IN COGNITIVE RADIO NETWORK by N Suganthi, R Meenakshi, A Sairam, M Parvathi

    Published 2025-06-01
    “…The approach integrates a Decision Tree (DT) algorithm for rapid initial classification of Primary User (PU) activity, followed by a Hill Climbing (HC) optimization algorithm that fine-tunes the detection based on a fitness function. Entropy and throughput metrics are employed as decision conditions at each sensing channel, enhancing uncertainty measurement and maintaining detection robustness under low Signal-to-Noise Ratio (SNR) conditions. …”
    Get full text
    Article
  15. 395
  16. 396

    Automated Artery Detection and Stenosis Classification in CTA Using Deep Learning for Peripheral Arterial Disease by Ali M. O. A. Anwer, Hacer Karacan, Muhammed Rabee, Levent Enver, Gonca Cabuk

    Published 2025-01-01
    “…Peripheral Arterial Disease (PAD) is one of the most important cardiovascular diseases worldwide for several million humans, associated with substantial morbidity, mortality, and healthcare resource utilization. Computed Tomography Angiography (CTA) is a high-quality imaging modality in PAD diagnostics, which directly highlights the vasculature having high resolution. …”
    Get full text
    Article
  17. 397

    VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes by Yunxiang Liu, Yuqing Shi

    Published 2025-01-01
    “…Accurate detection of vulnerable road users (VRUs) is critical for enhancing traffic safety and advancing autonomous driving systems. …”
    Get full text
    Article
  18. 398

    Machine learning-based model for acute asthma exacerbation detection using routine blood parameters by Youpeng Chen, Junquan Sun, Yabang Chen, Enzhong Li, Jiancai Lu, Huanhua Tang, Yifei Xie, Jiana Zhang, Lesi Peng, Haojie Wu, Zhangkai J. Cheng, Baoqing Sun

    Published 2025-07-01
    “…Background: Acute asthma exacerbations (AAEs) are a leading cause of asthma-related morbidity and mortality, especially in resource-limited settings where pulmonary function tests are unavailable or when patients are unable to cooperate with testing. …”
    Get full text
    Article
  19. 399
  20. 400

    TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5 by Han Wang, Zhenwei Yang, Qiaoshou Liu, Qiang Zhang, Honggang Wang

    Published 2025-05-01
    “…Finally, the EIOU loss function is introduced to measure the overlap between the predicted box and the real box more accurately and improve the detection accuracy. …”
    Get full text
    Article