Showing 321 - 340 results of 1,810 for search '((\ (source OR sources) detection functions\ ) OR (( resource OR resources) detection function\ ))', query time: 0.42s Refine Results
  1. 321

    New groups of highly divergent proteins in families as old as cellular life with important biological functions in the ocean by Duncan Sussfeld, Romain Lannes, Eduardo Corel, Guillaume Bernard, Pierre Martin, Eric Bapteste, Eric Pelletier, Philippe Lopez

    Published 2025-06-01
    “…Protein sequence similarity network approaches, in particular, appear well-suited to highlight potential sources of biological novelty and make better sense of microbial dark matter across taxonomical scales.…”
    Get full text
    Article
  2. 322

    Real time wire rope detection method based on Rockchip RK3588 by Mengpeng Qian, Yong Wang, Shaoqing Liu, Zhanghou Xu, Zhenshan Ji, Ming Chen, Hailong Wu, Zuchao Zhang

    Published 2025-08-01
    “…To enhance non-destructive wire rope inspection, a Mini-YOLO model was developed by integrating MobileNetV3, the Coordinate Attention (CA) mechanism, and a novel loss function, Inner-IoU, into the YOLOv8 framework. This paper’s innovation lies not in creating algorithmic components from scratch, but in their synergistic integration and targeted optimization to solve the specific challenges of real-time defect detection on resource-constrained edge devices. …”
    Get full text
    Article
  3. 323

    SGSNet: a lightweight deep learning model for strawberry growth stage detection by Zhiyu Li, Jianping Wang, Guohong Gao, Yufeng Lei, Chenping Zhao, Yan Wang, Haofan Bai, Yuqing Liu, Xiaojuan Guo, Qian Li

    Published 2024-12-01
    “…Furthermore, SGSNet has a computational cost of only 14.7 GFLOPs and a parameter count as low as 5.86 million, demonstrating an effective balance between high performance and resource efficiency.DiscussionLightweight deep learning model SGSNet not only exceeds the mainstream model in detection accuracy, but also greatly reduces the need for computing resources and is suitable for portable devices. …”
    Get full text
    Article
  4. 324

    Research on Underwater Target Detection Technology Based on SMV-YOLOv11n by Dongcheng Liao, Yijun Shen, Jinyu Ou, Yanlian Du

    Published 2025-01-01
    “…High-precision underwater object detection is a crucial component for improving the efficiency of marine resource development. …”
    Get full text
    Article
  5. 325
  6. 326
  7. 327

    An enhanced lightweight model for apple leaf disease detection in complex orchard environments by Ge Wang, Wenjie Sang, Fangqian Xu, Yuteng Gao, Yue Han, Qiang Liu

    Published 2025-03-01
    “…However, in complex natural environments, factors such as light variations, shading from branches and leaves, and overlapping disease spots often result in reduced accuracy in detecting apple diseases. To address the challenges of detecting small-target diseases on apple leaves in complex backgrounds and difficulty in mobile deployment, we propose an enhanced lightweight model, ELM-YOLOv8n.To mitigate the high consumption of computational resources in real-time deployment of existing models, we integrate the Fasternet Block into the C2f of the backbone network and neck network, effectively reducing the parameter count and the computational load of the model. …”
    Get full text
    Article
  8. 328

    3L-YOLO: A Lightweight Low-Light Object Detection Algorithm by Zhenqi Han, Zhen Yue, Lizhuang Liu

    Published 2024-12-01
    “…Existing methods often use image enhancement to improve detection, which results in a large amount of computational resource consumption. …”
    Get full text
    Article
  9. 329

    Automatic detection of foreign object intrusion along railway tracks based on MACENet. by Xichun Chen, Yu Tian, Ming Li, Bin Lv, Shuo Zhang, Zixian Qu, Jianqing Wu, Shiya Cheng

    Published 2025-01-01
    “…Ensuring high accuracy and efficiency in foreign object intrusion detection along railway lines is critical for guaranteeing railway operational safety under limited resource conditions. …”
    Get full text
    Article
  10. 330

    Rice disease detection method based on multi-scale dynamic feature fusion by Qian Fan, Runhao Chen, Bin Li

    Published 2025-05-01
    “…These optimizations enable efficient deployment on resource-constrained mobile devices, making the model highly suitable for real-time disease detection in practical agricultural scenarios where hardware limitations are critical. …”
    Get full text
    Article
  11. 331

    Automatic detection of floating instream large wood in videos using deep learning by J. Aarnink, J. Aarnink, T. Beucler, T. Beucler, M. Vuaridel, V. Ruiz-Villanueva, V. Ruiz-Villanueva

    Published 2025-02-01
    “…Therefore, the findings of this paper could be used when designing a custom wood detection network. With the growing availability of flood-related videos featuring wood uploaded to the internet, this methodology facilitates the quantification of wood transport across a wide variety of data sources.…”
    Get full text
    Article
  12. 332

    An improved lightweight tiny-person detection network based on YOLOv8: IYFVMNet by Fan Yang, Lihu Pan, Hongyan Cui, Linliang Zhang

    Published 2025-04-01
    “…IntroductionIn the aviation field, drone search and rescue is a highly urgent task involving small target detection. In such a resource-constrained scenario, there are challenges of low accuracy and high computational requirements.MethodsThis paper proposes IYFVMNet, an improved lightweight detection network based on YOLOv8. …”
    Get full text
    Article
  13. 333

    Quantifying Truthfulness: A Probabilistic Framework for Atomic Claim-Based Misinformation Detection by Fahim Sufi, Musleh Alsulami

    Published 2025-05-01
    “…This paper addresses this gap by proposing a novel probabilistic framework that decomposes complex assertions into semantically atomic claims and computes their veracity through a structured evaluation of source credibility and evidence frequency. Each atomic unit is matched against a curated corpus of 11,928 cyber-related news entries using a binary alignment function, and its truthfulness is quantified via a composite score integrating both source reliability and support density. …”
    Get full text
    Article
  14. 334

    Optimizing Pre-Trained Code Embeddings With Triplet Loss for Code Smell Detection by Ali Nizam, Ertugrul Islamoglu, Omer Kerem Adali, Musa Aydin

    Published 2025-01-01
    “…Although code embedding-based systems have been successfully applied to various source code analysis tasks, further research is required to enhance code embedding for better code analysis capabilities, aiming to surpass the performance and functionality of static code analysis tools. …”
    Get full text
    Article
  15. 335
  16. 336

    Automated identification of soil functional components based on NanoSIMS data by Yahan Hu, Johann Maximilian Zollner, Carmen Höschen, Martin Werner, Steffen A. Schweizer

    Published 2024-12-01
    “…The tool is provided as an open-source software toolbox (NanoT). In addition, a two-step unsupervised segmentation method was developed to identify soil functional components based on NanoSIMS analyses. …”
    Get full text
    Article
  17. 337

    A Hybrid and Modular Integration Concept for Anomaly Detection in Industrial Control Systems by Christian Goetz, Bernhard G. Humm

    Published 2025-04-01
    “…Therefore, in this paper, we present a modular and hybrid concept that enables the integration of efficient and effective anomaly detection while optimising the use of available resources under consideration of industrial requirements. …”
    Get full text
    Article
  18. 338
  19. 339

    Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms by Mehdi Ellouze

    Published 2021-01-01
    “…Social networks have become an important source of information from which we can extract valuable indicators that can be used in many fields such as marketing, statistics, and advertising among others. …”
    Get full text
    Article
  20. 340

    SSB: Smart Contract Security Detection Tool Suitable for Industrial Control Scenarios by Ci Tao, Shuai He, Xingqiu Shen

    Published 2025-07-01
    “…The framework’s ability to model industrial invariants—covering security, functionality, consistency, time-related, and resource consumption aspects—provides a robust mechanism to prevent critical errors like unauthorized access or premature equipment operation. …”
    Get full text
    Article