Search alternatives:
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 41 - 60 results of 1,810 for search '(resources OR source) detection function', query time: 0.20s Refine Results
  1. 41
  2. 42

    Dynamic activation and enhanced image contour features for object detection by Jun Wu, Jiahui Zhu, Xin Tong, Tianliang Zhu, Tianyi Li, Chunzhi Wang

    Published 2023-12-01
    “…At this stage mobile devices often have limited storage resources to deploy large object detection networks and need to meet real-time requirements. …”
    Get full text
    Article
  3. 43
  4. 44
  5. 45

    Lightweight Small Target Detection Algorithm Based on YOLOv8 Network Improvement by Xiaoyi Hao, Ting Li

    Published 2025-01-01
    “…Thirdly, it presents the FocalEloU-Loss function, which significantly enhances detection accuracy by refining bounding box predictions. …”
    Get full text
    Article
  6. 46

    An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM by Zhen Chen, ZhenWan Li, Jia Huang, ShengZheng Liu, HaiXia Long

    Published 2024-10-01
    “…Finally, combining the optimal threshold and loss function, we propose a model named MIX_LSTM for anomaly detection in IIoT. …”
    Get full text
    Article
  7. 47
  8. 48
  9. 49
  10. 50

    Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems by Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    Published 2024-01-01
    “…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
    Get full text
    Article
  11. 51

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Multi-view OCC approaches usually require collecting multi-view traffic data from all sources and have difficulty detecting intrusion independently in each view. …”
    Get full text
    Article
  12. 52

    A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks by Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun

    Published 2025-08-01
    “…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
    Get full text
    Article
  13. 53

    A Novel Method for Estimating Parameters of Magnetic Dipole Sources Under Low Signal-to-Noise Ratio Conditions Based on LM-OBF Algorithm by Zhaotao Yan, Zhaofa Zeng, Jianwei Zhao

    Published 2025-06-01
    “…It then constructs an objective function within a least squares framework and optimizes it using the Levenberg–Marquardt (LM) algorithm to achieve a stable estimation of magnetic source parameters. …”
    Get full text
    Article
  14. 54
  15. 55

    Research Progress on Dual Function Radar and Communication Signal Design and its Application in Typical Detection Scenarios by Yaping HE, Longfei SHI, Dong WANG, Jianglan TANG, Junxian CHEN, Jiazhi MA, Jialei LIU

    Published 2025-08-01
    “…Dual Function Radar and Communication (DFRC)-integrated electronic equipment platform, which combines detection and communication functions, effectively addresses issues such as platform limitations, resource constraints, and electromagnetic compatibility by sharing hardware platforms and transmitting waveforms. …”
    Get full text
    Article
  16. 56

    LFN-YOLO: precision underwater small object detection via a lightweight reparameterized approach by Mingxin Liu, Mingxin Liu, Yujie Wu, Ruixin Li, Cong Lin, Cong Lin

    Published 2025-01-01
    “…Underwater object detection plays a significant role in fisheries resource assessment and ecological environment protection. …”
    Get full text
    Article
  17. 57
  18. 58
  19. 59
  20. 60

    Simulation Study on Detection and Localization of a Moving Target Under Reverberation in Deep Water by Jincong Dun, Shihong Zhou, Yubo Qi, Changpeng Liu

    Published 2024-12-01
    “…Deep-water reverberation caused by multiple reflections from the seafloor and sea surface can affect the performance of active sonars. To detect a moving target under reverberation conditions, a reverberation suppression method using multipath Doppler shift in deep water and wideband ambiguity function (WAF) is proposed. …”
    Get full text
    Article