Showing 101 - 120 results of 2,295 for search '((\ sources selection function\ ) OR (( resourcessss OR resources) detection functions\ ))', query time: 0.27s Refine Results
  1. 101

    KronNet a lightweight Kronecker enhanced feed forward neural network for efficient IoT intrusion detection by Saeed Ullah, Junsheng Wu, Mian Muhammad Kamal, Abdul Khader Jilani Saudagar

    Published 2025-07-01
    “…Abstract The rapid expansion of Internet of Things (IoT) networks necessitates efficient intrusion detection systems (IDS) capable of operating within the stringent resource constraints of IoT devices. …”
    Get full text
    Article
  2. 102
  3. 103

    YOLOv11-GSF: an optimized deep learning model for strawberry ripeness detection in agriculture by Haoran Ma, Qian Zhao, Runqing Zhang, Chunxu Hao, Wenhui Dong, Xiaoying Zhang, Fuzhong Li, Xiaoqin Xue, Gongqing Sun

    Published 2025-08-01
    “…To overcome these limitations, this paper introduces YOLOv11-GSF, a real-time strawberry ripeness detection algorithm based on YOLOv11, which incorporates several innovative features: a Ghost Convolution (GhostConv) convolution method for generating rich feature maps through lightweight linear transformations, thereby reducing computational overhead and enhancing resource utilization; a C3K2-SG module that combines self-moving point convolution (SMPConv) and convolutional gated linear units (CGLU) to better capture the local features of strawberry ripeness; and a F-PIoUv2 loss function inspired by Focaler IoU and PIoUv2, utilizing adaptive penalty factors and interval mapping to expedite model convergence and optimize ripeness classification. …”
    Get full text
    Article
  4. 104
  5. 105

    Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning by Weijia Li, Jinhua Yu, Dairong Chen, Yi Lin, Runmin Dong, Xiang Zhang, Conghui He, Haohuan Fu

    Published 2025-03-01
    “…In the second stage, to further optimize the pseudo-labels, we effectively utilize the geometric spatial relationships between GIS map data and panoramic street-view images, integrating the building function information with facade detection results. …”
    Get full text
    Article
  6. 106
  7. 107

    SDES-YOLO: A high-precision and lightweight model for fall detection in complex environments by Xiangqian Huang, Xiaoming Li, Limengzi Yuan, Zhao Jiang, Hongwei Jin, Wanghao Wu, Ru Cai, Meilian Zheng, Hongpeng Bai

    Published 2025-01-01
    “…These results indicate that SDES-YOLO successfully combines efficiency and precision in fall detection. Through these innovations, SDES-YOLO not only improves detection accuracy but also optimizes computational efficiency, making it effective even in resource-constrained environments.…”
    Get full text
    Article
  8. 108

    Quality assessment of garden strawberries of foreign selection by I. M. Novikova, O. M. Blinnikova, A. S. Ilyinsky

    Published 2024-04-01
    “…At the same time, the need to use domestically produced raw materials, as well as functional ingredients from these raw materials in the production of a wide range of products for healthy and preventive nutrition, is clear lystated. …”
    Get full text
    Article
  9. 109

    New source of cellulase production using a metagenomic technique by Safaa M. Ali, Nadia A. Soliman

    Published 2019-12-01
    “…In the outlook, the metagenomic guide approachs may be functional to the elevated selection of novel cellulase from the environment.…”
    Get full text
    Article
  10. 110
  11. 111
  12. 112
  13. 113

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…In this problem, this paper establishes an interference resource optimization model with radar detection probability, interference effectiveness, and interference bandwidth utilization as the objective functions. …”
    Get full text
    Article
  14. 114
  15. 115

    A review on WSN based resource constrained smart IoT systems by Shreeram Hudda, K. Haribabu

    Published 2025-05-01
    “…DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network’s edge to enhance performance. …”
    Get full text
    Article
  16. 116
  17. 117

    Rice Disease Detection: TLI-YOLO Innovative Approach for Enhanced Detection and Mobile Compatibility by Zhuqi Li, Wangyu Wu, Bingcai Wei, Hao Li, Jingbo Zhan, Songtao Deng, Jian Wang

    Published 2025-04-01
    “…This study aims to develop a rice disease detection model that is highly accurate, resource efficient, and suitable for mobile deployment to address the limitations of existing technologies. …”
    Get full text
    Article
  18. 118

    Biomimetic Microfluidic Pumps for Selective Oil–Water Separation by Zhaolong Wang, Yinfeng Li, Mingzhu Xie, Ziheng Zhan, Wenhao Li, Qihui Xie, Yong Shuai, Zhichao Dong, Zuankai Wang

    Published 2025-07-01
    “…The findings underscore the potential of 3D bionic functional spring microchannels for selectively separating a wide range of oil‐water mixtures with exceptional efficiency.…”
    Get full text
    Article
  19. 119

    Optimum Arrangement of Reactive Power Sources While Using Genetic Algori by A. M. Gashimov, R. N. Rakhmanov, S. T. Rakhmanov

    Published 2010-02-01
    “…This objective can be achieved by optimum distribution of reactive power sources in proper places of distribution electricity supply network. …”
    Get full text
    Article
  20. 120

    Research Progress of Air Source Heat Pump Heat Storage System by Ni Long, Zhou Chaohui, Yao Yang, Jiang Yiqiang

    Published 2017-01-01
    “…The combination of heat storage technology and air source heat pump (ASHP) can provide heat source for air source heat pump defrosting, solve the problem of variable heat due to the fluctuation of outdoor air parameters, alleviate the contradiction between supply and demand, and perform an important function on the peak load shifting. …”
    Get full text
    Article