Search alternatives:
functions » function (Expand Search)
Showing 141 - 160 results of 1,810 for search '(( resource detection functions ) OR (( source OR sources) detection functions ))', query time: 0.34s Refine Results
  1. 141
  2. 142

    An Improved YOLOv9s Algorithm for Underwater Object Detection by Shize Zhou, Long Wang, Zhuoqun Chen, Hao Zheng, Zhihui Lin, Li He

    Published 2025-01-01
    “…However, the complex marine environment, poor resolution, color distortion in underwater optical imaging, and limited computational resources all affect the accuracy and efficiency of underwater object detection. …”
    Get full text
    Article
  3. 143

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
    Get full text
    Article
  4. 144

    Software with artificial intelligence-derived algorithms for detecting and analysing lung nodules in CT scans: systematic review and economic evaluation by Julia Geppert, Peter Auguste, Asra Asgharzadeh, Hesam Ghiasvand, Mubarak Patel, Anna Brown, Surangi Jayakody, Emma Helm, Dan Todkill, Jason Madan, Chris Stinton, Daniel Gallacher, Sian Taylor-Phillips, Yen-Fu Chen

    Published 2025-05-01
    “…Information required to populate the models included the prevalence of lung nodules, risk of lung cancer with different nodule sizes, sensitivity and specificity for nodule detection, nodule type and size distributions in different population, resource use, costs and utilities. …”
    Get full text
    Article
  5. 145

    The Advanced Role of Carbon Quantum Dots in Nano-Food Science: Applications, Bibliographic Analysis, Safety Concerns, and Perspectives by Abdul Majid, Khurshid Ahmad, Liju Tan, Waqas Niaz, Wang Na, Li Huiru, Jiangtao Wang

    Published 2024-12-01
    “…This article discussed the sources, fabrication methods, advantages, and limitations of CQDs as a sensing for the detection of food contaminants. …”
    Get full text
    Article
  6. 146
  7. 147

    Dynamic activation and enhanced image contour features for object detection by Jun Wu, Jiahui Zhu, Xin Tong, Tianliang Zhu, Tianyi Li, Chunzhi Wang

    Published 2023-12-01
    “…At this stage mobile devices often have limited storage resources to deploy large object detection networks and need to meet real-time requirements. …”
    Get full text
    Article
  8. 148
  9. 149

    Design of a Non-Destructive Seed Counting Instrument for Rapeseed Pods Based on Transmission Imaging by Shengyong Xu, Rongsheng Xu, Pan Ma, Zhenhao Huang, Shaodong Wang, Zhe Yang, Qingxi Liao

    Published 2024-12-01
    “…A transmission imaging device that mimics the human eye’s method of counting seeds was designed, incorporating an LED transmission light source, photoelectric switch-triggered imaging slot, an industrial camera, and an integrated packaging frame. …”
    Get full text
    Article
  10. 150

    Dual‐Function Ceramic Pigments for Energy‐Efficient and Secure Autonomous Vehicles by Ik Hoon Jeong, Yong‐Jun Seo, Jum Soo Hwang, Geun Hyeong Kim, Yeong Jae Kim, Gil Ju Lee

    Published 2025-07-01
    “…The results indicate that although the scattering is not strictly retro‐reflective, it strongly redirects the incident wave back toward its source, which is advantageous for LiDAR‐based object detection. …”
    Get full text
    Article
  11. 151
  12. 152

    Lightweight Small Target Detection Algorithm Based on YOLOv8 Network Improvement by Xiaoyi Hao, Ting Li

    Published 2025-01-01
    “…Thirdly, it presents the FocalEloU-Loss function, which significantly enhances detection accuracy by refining bounding box predictions. …”
    Get full text
    Article
  13. 153

    An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM by Zhen Chen, ZhenWan Li, Jia Huang, ShengZheng Liu, HaiXia Long

    Published 2024-10-01
    “…Finally, combining the optimal threshold and loss function, we propose a model named MIX_LSTM for anomaly detection in IIoT. …”
    Get full text
    Article
  14. 154

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  15. 155
  16. 156

    An Attomolar-Level Optical Device for Monitoring Receptor–Analyte Interactions Without Functionalization Steps: A Case Study of Cytokine Detection by Nunzio Cennamo, Francesco Arcadio, Chiara Marzano, Rosalba Pitruzzella, Mimimorena Seggio, Maria Pesavento, Stefano Toldo, Antonio Abbate, Luigi Zeni

    Published 2025-02-01
    “…The POF-based device was proven to be effective for detecting several interleukins at the attomolar level in a few minutes and without functionalization processes.…”
    Get full text
    Article
  17. 157
  18. 158
  19. 159

    LFN-YOLO: precision underwater small object detection via a lightweight reparameterized approach by Mingxin Liu, Mingxin Liu, Yujie Wu, Ruixin Li, Cong Lin, Cong Lin

    Published 2025-01-01
    “…Underwater object detection plays a significant role in fisheries resource assessment and ecological environment protection. …”
    Get full text
    Article
  20. 160

    KronNet a lightweight Kronecker enhanced feed forward neural network for efficient IoT intrusion detection by Saeed Ullah, Junsheng Wu, Mian Muhammad Kamal, Abdul Khader Jilani Saudagar

    Published 2025-07-01
    “…Abstract The rapid expansion of Internet of Things (IoT) networks necessitates efficient intrusion detection systems (IDS) capable of operating within the stringent resource constraints of IoT devices. …”
    Get full text
    Article