Search alternatives:
resource » source (Expand Search)
Showing 1 - 20 results of 993 for search 'Resource detection function', query time: 0.16s Refine Results
  1. 1

    Resource scheduling based on routing tree and detection matrix for Internet of things by Hongying Bai, Xiaotong Zhang, Yuxin Liu, Yingdong Xie

    Published 2021-03-01
    “…This article proposes a new efficient resource scheduling based on routing tree and detection matrix for Internet of things. …”
    Get full text
    Article
  2. 2

    A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity by Wenda Yang, Minggong Wu, Xiangxi Wen, Kexin Bi

    Published 2022-01-01
    “…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
    Get full text
    Article
  3. 3

    Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression by Kyusoon Kim, Seunghee Oh, Kiwook Bae, Hee-Seok Oh

    Published 2025-01-01
    “…To exploit the consecutive nature of OES data, we propose a prediction method based on a functional approach using multivariate functional partial least squares regression, coupled with dimension reduction and a novel outlier detection technique via functional independent component analysis. …”
    Get full text
    Article
  4. 4
  5. 5

    PFW-YOLO Lightweight Helmet Detection Algorithm by Yue Hong, Hao Wang, Shuo Guo

    Published 2025-01-01
    “…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
    Get full text
    Article
  6. 6

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  7. 7

    Identification and Mining of Functional Components of Polyphenols in Fruits of <i>Malus</i> Germplasm Resources Based on Multivariate Analysis by Dajiang Wang, Guangyi Wang, Xiang Lu, Zhao Liu, Simiao Sun, Hanxin Guo, Wen Tian, Zichen Li, Lin Wang, Lianwen Li, Yuan Gao, Kun Wang

    Published 2024-10-01
    “…These results provide us with information regarding the polyphenol composition and content of the wild apple resources and local cultivars. The high polyphenol content resources obtained by screening can be used as raw materials for the extraction of polyphenol components and functional fruit juice processing and can also be used as parents for functional fruit creation and variety breeding.…”
    Get full text
    Article
  8. 8
  9. 9

    Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples by Maytawan Thanunchai, Sirikwan Sangboonruang, Natthawat Semakul, Kattareeya Kumthip, Niwat Maneekarn, Khajornsak Tragoolpua

    Published 2025-06-01
    “…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
    Get full text
    Article
  10. 10

    Robotic arm target detection algorithm combined with deep learning by ZHANG Lei, ZHANG Wang, YUAN Yuan

    Published 2024-12-01
    “…Existing target detection algorithms deployed on robotic arms would occupy a large amount of system resources, have poor real-time detection performance, and have a large number of model parameters. …”
    Get full text
    Article
  11. 11

    Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis by Rati Bhan, Parvez Faruki, Rajendra Pamula

    Published 2025-01-01
    “…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
    Get full text
    Article
  12. 12

    A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps by Yoshihiro Nakashima, Akane Hashizume, Akane Kanda

    Published 2024-07-01
    “…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
    Get full text
    Article
  13. 13
  14. 14

    An Improved YOLOv9s Algorithm for Underwater Object Detection by Shize Zhou, Long Wang, Zhuoqun Chen, Hao Zheng, Zhihui Lin, Li He

    Published 2025-01-01
    “…However, the complex marine environment, poor resolution, color distortion in underwater optical imaging, and limited computational resources all affect the accuracy and efficiency of underwater object detection. …”
    Get full text
    Article
  15. 15

    Efficient Small Object Detection You Only Look Once: A Small Object Detection Algorithm for Aerial Images by Jie Luo, Zhicheng Liu, Yibo Wang, Ao Tang, Huahong Zuo, Ping Han

    Published 2024-11-01
    “…Moreover, existing object detection algorithms have a large number of parameters, posing a challenge for deployment on drones with limited hardware resources. …”
    Get full text
    Article
  16. 16

    Dynamic activation and enhanced image contour features for object detection by Jun Wu, Jiahui Zhu, Xin Tong, Tianliang Zhu, Tianyi Li, Chunzhi Wang

    Published 2023-12-01
    “…At this stage mobile devices often have limited storage resources to deploy large object detection networks and need to meet real-time requirements. …”
    Get full text
    Article
  17. 17
  18. 18

    Lightweight Small Target Detection Algorithm Based on YOLOv8 Network Improvement by Xiaoyi Hao, Ting Li

    Published 2025-01-01
    “…Thirdly, it presents the FocalEloU-Loss function, which significantly enhances detection accuracy by refining bounding box predictions. …”
    Get full text
    Article
  19. 19

    An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM by Zhen Chen, ZhenWan Li, Jia Huang, ShengZheng Liu, HaiXia Long

    Published 2024-10-01
    “…Finally, combining the optimal threshold and loss function, we propose a model named MIX_LSTM for anomaly detection in IIoT. …”
    Get full text
    Article
  20. 20