-
1
EVALUATION OF MEASURES TO DETECT MISAPPROPRIATION OF RESOURCES
Published 2016-08-01“…The article presents the methodological and technical foundations of the study evaluating the effectiveness of measures to detect misuse of resources. The focus is on the algorithm steps to prepare information and conduct calculations to identify the misuse of resources. …”
Get full text
Article -
2
Assessing Fracture Detection: A Comparison of Minimal-Resource and Standard-Resource Plain Radiographic Interpretations
Published 2025-03-01“…<b>Conclusions:</b> The standard-resource method is superior in detecting fractures compared to the minimal-resource method. …”
Get full text
Article -
3
Resource control conflict detection mechanism in trustworthy and controllable network
Published 2010-01-01Subjects: “…resource control…”
Get full text
Article -
4
Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing
Published 2025-01-01“…Although state-of-the-art deep learning-based OD methods achieve high detection rates, their large model size and high computational demands often hinder deployment on resource-constrained edge devices. …”
Get full text
Article -
5
Misinformation Detection: A Review for High and Low-Resource Languages
Published 2024-12-01Subjects: “…misinformation detection, low-resource languages, high-resource languages, african languages.…”
Get full text
Article -
6
Resource control conflict detection mechanism in trustworthy and controllable network
Published 2010-01-01Subjects: “…resource control;trustworthy and controllable network;conflict detection;policy…”
Get full text
Article -
7
A Robust Resource-Aware Framework for YOLO-Based Object Detection in Dynamic and Multi-Platform Resource-Constrained Environments
Published 2025-01-01Subjects: “…Resource-aware framework…”
Get full text
Article -
8
Resource efficient Internet-of-Things intrusion detection with spiking neural networks
Published 2024-11-01Get full text
Article -
9
Anomaly detection on compressed data in resource-constrained smart water meters
Published 2022-09-01Get full text
Article -
10
Resource scheduling based on routing tree and detection matrix for Internet of things
Published 2021-03-01“…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
Get full text
Article -
11
Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints
Published 2024-01-01Subjects: “…Anomaly detection…”
Get full text
Article -
12
PHILDER: Lightweight Framework for Intelligent Phishing Detection on Resource-Limited Devices
Published 2025-01-01“…This paper proposes a deep learning-based approach for the automatic detection of phishing in emails, the PHILDER (PHishing Intelligent Lightweight DEtection on Resource-limited devices) model. …”
Get full text
Article -
13
Automatic detection and extraction of key resources from tables in biomedical papers
Published 2025-03-01“…Conclusions Our pipelines allow the detection and extraction of key resources from tables with much higher accuracy, enabling the deployment of automated research resource extraction tools on BioRxiv to help authors correct unidentifiable key resources detected in their articles and improve the reproducibility of their findings. …”
Get full text
Article -
14
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01Subjects: “…Cryptographic attack event detection…”
Get full text
Article -
15
Optimal resource allocation for two-stage connectionless access with collision detection
Published 2019-05-01“…Connectionless access allows massive machine type communication (mMTC) devices to transmit small packets without establishment of radio bearers,significantly reducing device power consumption and control signaling overhead.Two-stage connectionless access (TSCLA) improves throughput and resource efficiency by optimally allocating resources between scheduling request (SR) phase and data transmission phase,which can be used for bigger packets and high traffic load.Based on this,a comprehensive theoretical analysis of one kind of TSCLA with collision detection was conducted to investigate its performance limit and devise its optimal resource allocation scheme.In addition,to avoid the complexity of user number estimation,a dynamic resource allocation algorithm with feedback control was proposed.Numerical results are provided to validate the effectiveness of aforementioned theoretical results and show that comparing with the genie aided algorithm known exactly the number of users,the performance loss of the proposed algorithm is within 4%.These works together provide good references for appropriate resource dimensioning for mMTC related protocols.…”
Get full text
Article -
16
A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity
Published 2022-01-01“…Firstly, a multiple input multiple output (MIMO) cooperative detection model is constructed. Then, based on the perspective of information theory, the channel capacity of the cooperative detection model is derived and used as the objective function for optimizing the detection resources of UAV swarm. …”
Get full text
Article -
17
Federated knowledge distillation for enhanced insulator defect detection in resource‐constrained environments
Published 2024-12-01“…Abstract Insulator defect detection is crucial for the stable operation of power systems. …”
Get full text
Article -
18
MultiBanFakeDetect: Integrating advanced fusion techniques for multimodal detection of Bangla fake news in under-resourced contexts
Published 2025-12-01Subjects: “…Fake news detection…”
Get full text
Article -
19
Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks
Published 2025-02-01“…The proposed lightweight AIDS leverages novelty detection and outlier detection algorithms instead of conventional classification algorithms to achieve (a) enhanced detection performance against both known and unknown attack patterns and (b) minimal computational costs.…”
Get full text
Article -
20
Investigating Offensive Language Detection in a Low-Resource Setting with a Robustness Perspective
Published 2024-11-01“…Moroccan Darija, a dialect of Arabic, presents unique challenges for natural language processing due to its lack of standardized orthographies, frequent code switching, and status as a low-resource language. In this work, we focus on detecting offensive language in Darija, addressing these complexities. …”
Get full text
Article