Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
Showing 421 - 440 results of 1,810 for search '((( resource OR resources) detection functions ) OR ( sources detection functions ))', query time: 0.33s Refine Results
  1. 421
  2. 422
  3. 423

    GastroEndoNet: Comprehensive endoscopy image dataset for GERD and polyp detectionMendeley Data by Abu Kowshir Bitto, Md. Hasan Imam Bijoy, Kamrul Hassan Shakil, Aka Das, Khalid Been Badruzzaman Biplob, Imran Mahmud, Syed Md. Minhaz Hossain

    Published 2025-06-01
    “…It provides an invaluable resource for developing machine learning models aimed at the automatic diagnosis, classification, and detection of GERD and polyps, potentially improving the speed and accuracy of clinical decision-making. …”
    Get full text
    Article
  4. 424

    TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5 by Han Wang, Zhenwei Yang, Qiaoshou Liu, Qiang Zhang, Honggang Wang

    Published 2025-05-01
    “…However, autonomous vehicles deal with large amounts of real-time data, which places extremely high demands on computing resources. Therefore, a lightweight object detection algorithm based on YOLOv5 is proposed to solve the problem of excessive network parameters in automatic driving scenarios. …”
    Get full text
    Article
  5. 425

    YOLOv8n-DDSW: an efficient fish target detection network for dense underwater scenes by Jinwang Yi, Wei Han, Fangfei Lai

    Published 2025-04-01
    “…Therefore, the YOLOv8n-DDSW fish target detection algorithm was proposed in this article to resolve the detection difficulties resulting from fish occlusion, deformation and detail loss in complex intensive aquaculture scenarios. (1) The C2f-deformable convolutional network (DCN) module is proposed to take the place of the C2f module in the YOLOv8n backbone to raise the detection accuracy of irregular fish targets. (2) The dual-pooling squeeze-and-excitation (DPSE) attention mechanism is put forward and integrated into the YOLOv8n neck network to reinforce the features of the visible parts of the occluded fish target. (3) Small detection is introduced to make the network more capable of sensing small targets and improving recall. (4) Wise intersection over union (IOU) rather than the original loss function is used for improving the bounding box regression performance of the network. …”
    Get full text
    Article
  6. 426

    From fish to fiber: 3D-nanoprinted optical neuromast for multi-integrated underwater detection by Liangye Li, Xuhao Fan, Geng Chen, Yueqi Liu, Fujun Zhang, Zhuolin Chen, Zhi Zhang, Wangyang Xu, Shixiong Zhang, Yuncheng Liu, Zongjing Li, Hui Gao, Zhijun Yan, Wei Xiong, Qizhen Sun

    Published 2025-08-01
    “…Abstract Fish possess high sensitivity to acoustic, vibrational, and hydrodynamic stimuli through unique sensing cells, providing unparalleled paradigms for developing underwater detection methods. However, artificial perception devices face challenges in replicating comparable sensitivity and multi-dimensional integration of fish in function and scale. …”
    Get full text
    Article
  7. 427
  8. 428
  9. 429

    Smart Fault Detection, Classification, and Localization in Distribution Networks: AI-Driven Approaches and Emerging Technologies by Jianxian Wang, Hazlie Mokhlis, Nurulafiqah Nadzirah Mansor, Hazlee Azil Illias, Agileswari K. Ramasamy, Xingyu Wu, Siqi Wang

    Published 2025-01-01
    “…However, with nations worldwide actively pursuing carbon neutrality and emission peak goals, sustainable energy sources such as solar and wind are increasingly penetrating distribution networks, posing significant challenges to conventional fault detection, classification, and localization techniques due to bidirectional power flows, dynamic fault currents, and rising network complexity. …”
    Get full text
    Article
  10. 430

    Enhancing Human Detection in Occlusion-Heavy Disaster Scenarios: A Visibility-Enhanced DINO (VE-DINO) Model with Reassembled Occlusion Dataset by Zi-An Zhao, Shidan Wang, Min-Xin Chen, Ye-Jiao Mao, Andy Chi-Ho Chan, Derek Ka-Hei Lai, Duo Wai-Chi Wong, James Chung-Wai Cheung

    Published 2025-01-01
    “…While recent advancements in computer vision have improved detection capabilities, there remains a significant need for efficient solutions that can enhance search-and-rescue (SAR) operations in resource-constrained disaster scenarios. …”
    Get full text
    Article
  11. 431
  12. 432

    Lightweight coal miners and manned vehicles detection model based on deep learning and model compression techniques: A case study of coal mines in Guizhou region by Beijing XIE, Heng LI, Zheng LUAN, Zhen LEI, Xiaoxu LI, Zhuo LI

    Published 2025-02-01
    “…Compared to various lightweight architectures and advanced detection models, this method demonstrates excellent accuracy, lower computational costs, and better real-time performance, providing a feasible coal mine pedestrian-vehicle detection method for resource-constrained coal mine scenarios, meeting the deployment requirements of coal mine video surveillance and enabling real-time alerts for intelligent inspection of coal mine pedestrian-vehicles.…”
    Get full text
    Article
  13. 433
  14. 434

    Finite mixtures of functional graphical models: Uncovering heterogeneous dependencies in high-dimensional data. by Qihai Liu, Kevin H Lee, Hyun Bin Kang

    Published 2025-01-01
    “…In this work, we propose finite mixtures of functional graphical models (MFGM), which detect the heterogeneous subgroups of the population and estimate single graph for each subgroup by considering the correlation structures. …”
    Get full text
    Article
  15. 435

    Asynchronous bearing only tracking management approach in distributed multi-function integrated sensors by ZHANG Wei, YANG Qiu, LI Hao

    Published 2024-12-01
    “…The distributed multi-function system requires only one integrated sensor to switch to electronic support measure (ESM) mode within each tracking cycle to update the angle measurement information of target radiation source, while the other integrated sensors still work in the original planned mode and task. …”
    Get full text
    Article
  16. 436

    Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction by P. Kumudha, R. Venkatesan

    Published 2016-01-01
    “…Effective prediction of software modules, those that are prone to defects, will enable software developers to achieve efficient allocation of resources and to concentrate on quality assurance activities. …”
    Get full text
    Article
  17. 437

    Acoustic Emission as a Method for Analyzing Changes and Detecting Damage in Composite Materials During Loading by Katarzyna PANASIUK, Krzysztof DUDZIK, Grzegorz HAJDUKIEWICZ

    Published 2021-08-01
    “…The signal obtained from the sensor was then further processed and used to draw up diagrams of the AE hits, amplitude, root mean square of the AE source signal (RMS) and duration in the function of time. …”
    Get full text
    Article
  18. 438

    LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning by Xu Liu, Yuewen Liu, Miaomiao Wei, Peng Xu

    Published 2024-01-01
    “…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
    Get full text
    Article
  19. 439

    Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring by Kaitlin J. Palmer, Sam Tabbutt, Douglas Gillespie, Jesse Turner, Paul King, Dominic Tollit, Jessica Thompson, Jason Wood

    Published 2022-11-01
    “…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
    Get full text
    Article
  20. 440

    Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability by Vincent Zibi Mohale, Ibidun Christiana Obagbuwa

    Published 2025-05-01
    “…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
    Get full text
    Article