Search alternatives:
resource » source (Expand Search)
Showing 1 - 20 results of 7,386 for search 'Resource detection', query time: 0.17s Refine Results
  1. 1

    EVALUATION OF MEASURES TO DETECT MISAPPROPRIATION OF RESOURCES by Anastasiya V. Vasileva

    Published 2016-08-01
    “…The article presents the methodological and technical foundations of the study evaluating the effectiveness of measures to detect misuse of resources. The focus is on the algorithm steps to prepare information and conduct calculations to identify the misuse of resources. …”
    Get full text
    Article
  2. 2

    Assessing Fracture Detection: A Comparison of Minimal-Resource and Standard-Resource Plain Radiographic Interpretations by Iskandar Zakaria, Teuku Muhammad Yus, Safrizal Rahman, Azhari Gani, Muhammad Ariq Ersan

    Published 2025-03-01
    “…<b>Conclusions:</b> The standard-resource method is superior in detecting fractures compared to the minimal-resource method. …”
    Get full text
    Article
  3. 3
  4. 4

    Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing by Arief Setyanto, Theopilus Bayu Sasongko, Muhammad Ainul Fikri, Dhani Ariatmanto, I. Made Artha Agastya, Rakandhiya Daanii Rachmanto, Affan Ardana, In Kee Kim

    Published 2025-01-01
    “…Although state-of-the-art deep learning-based OD methods achieve high detection rates, their large model size and high computational demands often hinder deployment on resource-constrained edge devices. …”
    Get full text
    Article
  5. 5

    Misinformation Detection: A Review for High and Low-Resource Languages by Seani Rananga, Bassey Isong, Abiodun Modupe, Vukosi Marivate

    Published 2024-12-01
    Subjects: “…misinformation detection, low-resource languages, high-resource languages, african languages.…”
    Get full text
    Article
  6. 6

    Resource control conflict detection mechanism in trustworthy and controllable network by QU Yan-sheng, LUO Jun-zhou, LI Wei, WANG Peng, TAN Jing

    Published 2010-01-01
    Subjects: “…resource control;trustworthy and controllable network;conflict detection;policy…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Resource scheduling based on routing tree and detection matrix for Internet of things by Hongying Bai, Xiaotong Zhang, Yuxin Liu, Yingdong Xie

    Published 2021-03-01
    “…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
    Get full text
    Article
  11. 11
  12. 12

    PHILDER: Lightweight Framework for Intelligent Phishing Detection on Resource-Limited Devices by Guilherme Dantas Bispo, Cesar Augusto Borges de Andrade, Gabriela Mayumi Saiki, Raquel Valadares Borges, Andre Luiz Marques Serrano, Geraldo Pereira Rocha Filho, Vinicius Pereira Goncalves

    Published 2025-01-01
    “…This paper proposes a deep learning-based approach for the automatic detection of phishing in emails, the PHILDER (PHishing Intelligent Lightweight DEtection on Resource-limited devices) model. …”
    Get full text
    Article
  13. 13

    Automatic detection and extraction of key resources from tables in biomedical papers by Ibrahim Burak Ozyurt, Anita Bandrowski

    Published 2025-03-01
    “…Conclusions Our pipelines allow the detection and extraction of key resources from tables with much higher accuracy, enabling the deployment of automated research resource extraction tools on BioRxiv to help authors correct unidentifiable key resources detected in their articles and improve the reproducibility of their findings. …”
    Get full text
    Article
  14. 14

    Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection by Peng Luo, Rangjia Cai, Yuanbo Guo

    Published 2025-01-01
    Subjects: “…Cryptographic attack event detection…”
    Get full text
    Article
  15. 15

    Optimal resource allocation for two-stage connectionless access with collision detection by Xin JIAN, Fang WANG, Jian SONG, Shu FU, Xiaoheng TAN, Xiaoping ZENG

    Published 2019-05-01
    “…Connectionless access allows massive machine type communication (mMTC) devices to transmit small packets without establishment of radio bearers,significantly reducing device power consumption and control signaling overhead.Two-stage connectionless access (TSCLA) improves throughput and resource efficiency by optimally allocating resources between scheduling request (SR) phase and data transmission phase,which can be used for bigger packets and high traffic load.Based on this,a comprehensive theoretical analysis of one kind of TSCLA with collision detection was conducted to investigate its performance limit and devise its optimal resource allocation scheme.In addition,to avoid the complexity of user number estimation,a dynamic resource allocation algorithm with feedback control was proposed.Numerical results are provided to validate the effectiveness of aforementioned theoretical results and show that comparing with the genie aided algorithm known exactly the number of users,the performance loss of the proposed algorithm is within 4%.These works together provide good references for appropriate resource dimensioning for mMTC related protocols.…”
    Get full text
    Article
  16. 16

    A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity by Wenda Yang, Minggong Wu, Xiangxi Wen, Kexin Bi

    Published 2022-01-01
    “…Firstly, a multiple input multiple output (MIMO) cooperative detection model is constructed. Then, based on the perspective of information theory, the channel capacity of the cooperative detection model is derived and used as the objective function for optimizing the detection resources of UAV swarm. …”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks by Georgios Zachos, Georgios Mantas, Kyriakos Porfyrakis, Jonathan Rodriguez

    Published 2025-02-01
    “…The proposed lightweight AIDS leverages novelty detection and outlier detection algorithms instead of conventional classification algorithms to achieve (a) enhanced detection performance against both known and unknown attack patterns and (b) minimal computational costs.…”
    Get full text
    Article
  20. 20

    Investigating Offensive Language Detection in a Low-Resource Setting with a Robustness Perspective by Israe Abdellaoui, Anass Ibrahimi, Mohamed Amine El Bouni, Asmaa Mourhir, Saad Driouech, Mohamed Aghzal

    Published 2024-11-01
    “…Moroccan Darija, a dialect of Arabic, presents unique challenges for natural language processing due to its lack of standardized orthographies, frequent code switching, and status as a low-resource language. In this work, we focus on detecting offensive language in Darija, addressing these complexities. …”
    Get full text
    Article