Search alternatives:
resource » source (Expand Search)
Showing 261 - 280 results of 993 for search 'Resource detection function', query time: 0.12s Refine Results
  1. 261
  2. 262

    A Lightweight YOLOv8s Algorithm for Ceiling Fan Blade Defect Detection With Optimized Pruning and Knowledge Distillation by Qinyuan Huang, Chen Fan, Yuqi Sun, Jiaxiong Huang, Wengziyang Jiang

    Published 2025-01-01
    “…While industrial ceiling fans play a vital role in maintaining efficient airflow and system stability within factory settings, surface defects on their blades that arise over time can disrupt their functionality and create safety hazards. Detecting these surface defects is crucial; however, accurate and rapid detection typically involves complex machine vision algorithms, such as You Only Look Once (YOLO) networks, that require considerable computing resources, which contradicts the industry’s preference for simpler algorithms that can be deployed using low-cost computing power. …”
    Get full text
    Article
  3. 263

    A Cross-Stage Focused Small Object Detection Network for Unmanned Aerial Vehicle Assisted Maritime Applications by Gege Ding, Jiayue Liu, Dongsheng Li, Xiaming Fu, Yucheng Zhou, Mingrui Zhang, Wantong Li, Yanjuan Wang, Chunxu Li, Xiongfei Geng

    Published 2025-01-01
    “…Then, structural pruning was applied to refine the model and enhance its capability in detecting small objects. Moreover, to conserve computational resources, a lightweight CED module was introduced to reduce parameters and conserve the computing resources of the UAV. …”
    Get full text
    Article
  4. 264

    Complex-amplitude-modulated meta-device for optical image processing by Xinchen Jiang, Peicheng Lin, Yeang Zhang, Tao Tao, Yuan Du, Xuecou Tu, Ting Xu, Yan-qing Lu, Jun-long Kou

    Published 2025-06-01
    “…However, considering that electronic convolutional operation always contains million-level parameters and complex calculation process, it consumes a large number of computing resources and time. To overcome these limitations, we proposed a design of complex-amplitude-modulated meta-device which could perform various functions of image processing. …”
    Get full text
    Article
  5. 265

    Innovative machine learning-based prediction of early airway hyperresponsiveness using baseline pulmonary function parameters by Hua Yang, Xingru Zhao, Zhuochang Chen, Lihong Yang, Guihua Zhao, Chenxiao Xu, Jinyi Xu

    Published 2025-08-01
    “…BackgroundThe Bronchial Provocation Test (BPT) is the gold standard for diagnosing airway hyperresponsiveness (AHR) in suspected asthma patients but is time-consuming and resource-intensive. This study explores the potential of baseline pulmonary function parameters, particularly small airway indices, in predicting AHR and develops a machine learning-based model to improve screening efficiency and reduce unnecessary BPT referrals.MethodsThis retrospective study analyzed baseline pulmonary function data and BPT results from Henan Provincial People’s Hospital (May to September 2024). …”
    Get full text
    Article
  6. 266
  7. 267
  8. 268

    Ensuring Effective Functioning of Gas-Discharge Counters, Used in the Military Dose Rate Meters, in the Arctic Zone by A. V. Vasiliev, Yu. A. Glukhov, I. Y. Kulagin, K. S. Abaeva

    Published 2023-06-01
    “…At the same time, the region's rich natural resources create conditions for military conflicts and armed struggle of states for possession of these resources. …”
    Get full text
    Article
  9. 269
  10. 270

    BiEHFFNet: A Water Body Detection Network for SAR Images Based on Bi-Encoder and Hybrid Feature Fusion by Bin Han, Xin Huang, Feng Xue

    Published 2025-07-01
    “…Water body detection in synthetic aperture radar (SAR) imagery plays a critical role in applications such as disaster response, water resource management, and environmental monitoring. …”
    Get full text
    Article
  11. 271

    A Lightweight Method for Road Defect Detection in UAV Remote Sensing Images with Complex Backgrounds and Cross-Scale Fusion by Wenya Zhang, Xiang Li, Lina Wang, Danfei Zhang, Pengfei Lu, Lei Wang, Chuanxiang Cheng

    Published 2025-06-01
    “…Moreover, the CAA attention mechanism is employed to strengthen the model’s global feature extraction abilities; (2) a cross-scale feature fusion strategy known as GFPN is developed to tackle the problem of diverse target scales in road damage detection; (3) to reduce computational resource consumption, a lightweight detection head called EP-Detect has been specifically designed to decrease the model’s computational complexity and the number of parameters; and (4) the model’s localization capability for road damage targets is enhanced by integrating an optimized regression loss function called WiseIoUv3. …”
    Get full text
    Article
  12. 272
  13. 273

    A Method for Service Function Chain Migration Based on Server Failure Prediction in Mobile Edge Computing Environment by Joelle Kabdjou, Norihiko Shinomiya

    Published 2025-01-01
    “…However, traditional hardware-based middleboxes limit flexibility and scalability, leading to the adoption of Network Function Virtualization (NFV). NFV enables the deployment of network functions as software, optimizing resource allocation and reducing costs. …”
    Get full text
    Article
  14. 274

    RE-YOLO: An apple picking detection algorithm fusing receptive-field attention convolution and efficient multi-scale attention. by Jinxue Sui, Li Liu, Zuoxun Wang, Li Yang

    Published 2025-01-01
    “…The accuracy of current apple picking detection algorithms is still limited when the distribution is dense and occlusion exists, and there is a significant challenge in deploying current high accuracy detection models on edge devices with limited computational resources. …”
    Get full text
    Article
  15. 275

    VIRify: An integrated detection, annotation and taxonomic classification pipeline using virus-specific protein profile hidden Markov models. by Guillermo Rangel-Pineros, Alexandre Almeida, Martin Beracochea, Ekaterina Sakharova, Manja Marz, Alejandro Reyes Muñoz, Martin Hölzer, Robert D Finn

    Published 2023-08-01
    “…Overall, we demonstrate that VIRify is a novel and powerful resource that offers an enhanced capability to detect a broad range of viral contigs and taxonomically classify them.…”
    Get full text
    Article
  16. 276

    Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization by Wahid Rajeh, Majed Aborokbah, Manimurugan S., Umar Albalawi, Ahamed Aljuhani, Osama Shibl Abdalghany Younes, Karthikeyan Periyasami

    Published 2025-03-01
    “…Methods This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. …”
    Get full text
    Article
  17. 277
  18. 278
  19. 279

    Detection of power theft in sensitive stations based on generalized robust distance metric and multi-classification support vector machine by Wei Zhang, Qiong Cao, Shuai Yang, Hao Guo

    Published 2025-04-01
    “…Through training and optimization, the support vector machine outputs the detection results of electricity stealing behavior according to the decision function, and realizes the accurate detection of electricity stealing behavior. …”
    Get full text
    Article
  20. 280

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…Deep learning (DL) models show strong potential in detecting DoW attacks, where attackers disrupt services by exploiting system resources. …”
    Get full text
    Article