Results 181 to 190 of about 90,527 (273)

BeeCam-AprilTag: timing the flight duration of individual honey bees in remote field settings with AprilTag and Raspberry Pi. [PDF]

open access: yesMethodsX
Brandt S   +6 more
europepmc   +1 more source

Sensing Optimum in the Raw: Leveraging the Raw-Data Imaging Capabilities of Raspberry Pi for Diagnostics Applications. [PDF]

open access: yesSensors (Basel), 2021
Tonelli A   +11 more
europepmc   +1 more source

Optimization and Benchmarking of Lightweight Neural Networks for Efficient Embedded AI Deployment

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
A hardware‐aware optimization and benchmarking framework for lightweight neural networks is presented for deployment on heterogeneous embedded platforms including CPU, GPU, TPU, and MCU architectures. Model compression techniques such as quantization, pruning, knowledge distillation, and mixed‐precision computation reduce inference latency, memory ...
Vidapankal Mohammad Fridous   +4 more
wiley   +1 more source

Vertical‐Component Seismic Response and System Identification of a 52‐Story High‐Rise Building Using Earthquake Data

open access: yesEarthquake Spectra, Volume 42, Issue 2, May 2026.
This study investigates the vertical dynamic response of a 52‐story high‐rise building in downtown Los Angeles using small‐magnitude earthquake data recorded by the Community Seismic Network. While seismic design traditionally emphasizes horizontal ground motion, vertical accelerations can have a significant impact on tall structures, leading to ...
Viviana Vela   +4 more
wiley   +1 more source

Performance Evaluation of Privacy Models for Data Streams on the Edge

open access: yesInternet Technology Letters, Volume 9, Issue 3, May/June 2026.
ABSTRACT Recent advances in edge computing enable data stream privacy enforcement directly on resource‐constrained devices, reducing latency and the exposure of sensitive information. In this paper, we extend and validate our previously proposed privacy‐enforcing framework, which allows high‐level privacy policies to be expressed as chains of triggers ...
Ilir Murturi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy