Search alternatives:
resource » resources (Expand Search)
source » sources (Expand Search)
Showing 41 - 60 results of 1,810 for search '(resource OR source) detection function', query time: 0.19s Refine Results
  1. 41

    Dynamic activation and enhanced image contour features for object detection by Jun Wu, Jiahui Zhu, Xin Tong, Tianliang Zhu, Tianyi Li, Chunzhi Wang

    Published 2023-12-01
    “…At this stage mobile devices often have limited storage resources to deploy large object detection networks and need to meet real-time requirements. …”
    Get full text
    Article
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46

    Lightweight Small Target Detection Algorithm Based on YOLOv8 Network Improvement by Xiaoyi Hao, Ting Li

    Published 2025-01-01
    “…Thirdly, it presents the FocalEloU-Loss function, which significantly enhances detection accuracy by refining bounding box predictions. …”
    Get full text
    Article
  7. 47

    An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM by Zhen Chen, ZhenWan Li, Jia Huang, ShengZheng Liu, HaiXia Long

    Published 2024-10-01
    “…Finally, combining the optimal threshold and loss function, we propose a model named MIX_LSTM for anomaly detection in IIoT. …”
    Get full text
    Article
  8. 48
  9. 49
  10. 50

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  11. 51

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  12. 52

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  13. 53

    Research Progress on Dual Function Radar and Communication Signal Design and its Application in Typical Detection Scenarios by Yaping HE, Longfei SHI, Dong WANG, Jianglan TANG, Junxian CHEN, Jiazhi MA, Jialei LIU

    Published 2025-08-01
    “…Dual Function Radar and Communication (DFRC)-integrated electronic equipment platform, which combines detection and communication functions, effectively addresses issues such as platform limitations, resource constraints, and electromagnetic compatibility by sharing hardware platforms and transmitting waveforms. …”
    Get full text
    Article
  14. 54

    A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm by Zhaotao Yan, Zhaofa Zeng, Jianwei Zhao

    Published 2025-06-01
    “…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
    Get full text
    Article
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…Experimental results demonstrate robust performance under low computational resources, achieving high detection accuracy with high recall (>80%) even at 10% bus load fluctuation thresholds. …”
    Get full text
    Article