{"id":"https://openalex.org/W7139001203","doi":"https://doi.org/10.7717/peerj-cs.3579","title":"Edge-optimized threat detection with Florence v2 for autonomous surveillance in resource-constrained environments","display_name":"Edge-optimized threat detection with Florence v2 for autonomous surveillance in resource-constrained environments","publication_year":2026,"publication_date":"2026-03-20","ids":{"openalex":"https://openalex.org/W7139001203","doi":"https://doi.org/10.7717/peerj-cs.3579"},"language":"en","primary_location":{"id":"doi:10.7717/peerj-cs.3579","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3579","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.7717/peerj-cs.3579","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130054500","display_name":"Cynthia Konar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cynthia Konar","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129848388","display_name":"Diya Das","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Diya Das","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126640609","display_name":"Subitha D.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Subitha D.","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130185591","display_name":"Kavitha Jc","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kavitha Jc","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129886361","display_name":"Sweety Singh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sweety Singh","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5130054500"],"corresponding_institution_ids":[],"apc_list":{"value":1395,"currency":"USD","value_usd":1395},"apc_paid":{"value":1395,"currency":"USD","value_usd":1395},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50607455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"e3579","last_page":"e3579"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.4702000021934509,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.4702000021934509,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.17749999463558197,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.053199999034404755,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5303000211715698},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.46160000562667847},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.46070000529289246},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.41679999232292175},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.3801000118255615},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.36719998717308044},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3601999878883362},{"id":"https://openalex.org/keywords/memory-model","display_name":"Memory model","score":0.3375000059604645},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.33390000462532043},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.3294000029563904}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7337999939918518},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5303000211715698},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.483599990606308},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.46650001406669617},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.46160000562667847},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.46070000529289246},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.41679999232292175},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40950000286102295},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3926999866962433},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.3801000118255615},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.36719998717308044},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3601999878883362},{"id":"https://openalex.org/C12186640","wikidata":"https://www.wikidata.org/wiki/Q6815743","display_name":"Memory model","level":3,"score":0.3375000059604645},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.33390000462532043},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.3294000029563904},{"id":"https://openalex.org/C2985745059","wikidata":"https://www.wikidata.org/wiki/Q245","display_name":"Raspberry pi","level":3,"score":0.328900009393692},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3287999927997589},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.31290000677108765},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.31029999256134033},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C146778888","wikidata":"https://www.wikidata.org/wiki/Q836862","display_name":"Installation","level":2,"score":0.30160000920295715},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C131979681","wikidata":"https://www.wikidata.org/wiki/Q1899648","display_name":"Point cloud","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2980000078678131},{"id":"https://openalex.org/C2776104089","wikidata":"https://www.wikidata.org/wiki/Q15894079","display_name":"Location awareness","level":2,"score":0.2946000099182129},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2896000146865845},{"id":"https://openalex.org/C74912251","wikidata":"https://www.wikidata.org/wiki/Q6815727","display_name":"Memory footprint","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.28209999203681946},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.27880001068115234},{"id":"https://openalex.org/C107645828","wikidata":"https://www.wikidata.org/wiki/Q12070446","display_name":"System model","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.26170000433921814},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2540000081062317}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.7717/peerj-cs.3579","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3579","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:23b828b9a61b4ddea36dcee0c2f9add0","is_oa":true,"landing_page_url":"https://doaj.org/article/23b828b9a61b4ddea36dcee0c2f9add0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"PeerJ Computer Science, Vol 12, p e3579 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.7717/peerj-cs.3579","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3579","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.580138623714447}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2294631366","https://openalex.org/W2412558220","https://openalex.org/W2757594113","https://openalex.org/W2782562970","https://openalex.org/W2891201238","https://openalex.org/W2963175164","https://openalex.org/W3005145900","https://openalex.org/W3020343235","https://openalex.org/W3040892677","https://openalex.org/W3096831136","https://openalex.org/W3154625005","https://openalex.org/W3210702809","https://openalex.org/W4210875834","https://openalex.org/W4226134206","https://openalex.org/W4291804569","https://openalex.org/W4292319860","https://openalex.org/W4309969726","https://openalex.org/W4379382402","https://openalex.org/W4382135374","https://openalex.org/W4385347006","https://openalex.org/W4388280204","https://openalex.org/W4388833011","https://openalex.org/W4392188507","https://openalex.org/W4392188880","https://openalex.org/W4396908541","https://openalex.org/W4401544183","https://openalex.org/W4401835542","https://openalex.org/W4402262848","https://openalex.org/W4402661172","https://openalex.org/W4402753877","https://openalex.org/W4407978808","https://openalex.org/W4408036159","https://openalex.org/W4410597219","https://openalex.org/W6941506433","https://openalex.org/W6967005840"],"related_works":[],"abstract_inverted_index":{"This":[0,225],"research":[1],"presents":[2],"a":[3,37,52,99,149,183,222],"portable,":[4],"edge-optimized":[5],"system":[6,35,207,226],"designed":[7],"to":[8,158,174,208],"overcome":[9],"the":[10,64,81,166,192,206,216,228],"limitations":[11],"of":[12,101,124,155,191,198,230],"traditional":[13],"surveillance":[14,233],"in":[15,29,185],"detecting":[16],"modern":[17],"threats":[18],"such":[19,130],"as":[20,131],"disguised":[21],"individuals,":[22],"hidden":[23],"weapons,":[24],"and":[25,90,108,139,161,172,196,242],"flying":[26],"drones,":[27],"particularly":[28],"environments":[30],"with":[31,47,75,105],"limited":[32],"resources.":[33],"The":[34,94,117,201],"leverages":[36],"modified":[38],"Florence":[39,82],"v2":[40,83],"Vision-Language":[41],"Transformer":[42],"for":[43,67,218],"military-grade":[44],"object":[45],"detection,":[46],"its":[48,199],"core":[49],"deployed":[50],"on":[51,98,178],"Raspberry":[53,193],"Pi":[54],"5.":[55],"A":[56],"separate":[57],"ESP32-S2":[58,203],"DevKit":[59],"handles":[60],"wireless":[61],"alerts":[62,211],"using":[63,85],"ESP-NOW":[65],"protocol":[66],"fast,":[68],"local":[69],"communication.":[70],"To":[71],"achieve":[72],"high":[73],"accuracy":[74,123],"low":[76],"computational":[77],"overhead,":[78],"we":[79],"adapted":[80],"model":[84,95,119,147,167],"Parameter":[86],"Efficient":[87],"Fine-Tuning":[88],"(PEFT)":[89],"Low-Rank":[91],"Adaptation":[92],"(LoRA).":[93],"was":[96,168],"trained":[97],"dataset":[100],"12,000":[102],"images,":[103],"augmented":[104],"manual":[106],"annotations":[107],"synthetic":[109],"images":[110],"generated":[111],"by":[112],"Generative":[113],"Adversarial":[114],"Networks":[115],"(GANs).":[116],"final":[118],"achieved":[120,148],"an":[121],"overall":[122],"88.01%,":[125],"outperforming":[126],"other":[127],"popular":[128],"models":[129],"You":[132],"Only":[133],"Look":[134],"Once":[135],"version":[136],"8":[137],"(YOLOv8)":[138],"Fast":[140],"Region-based":[141],"Convolutional":[142],"Neural":[143],"Network":[144],"(FRCNN).":[145],"Our":[146],"Mean":[150],"Average":[151],"Precision":[152],"(mAP@50)":[153],"score":[154],"64.83,":[156],"compared":[157],"YOLOv8":[159],"(64)":[160],"FRCNN":[162],"(56).":[163],"After":[164],"training,":[165],"optimized":[169],"through":[170],"quantization":[171],"pruning":[173],"ensure":[175],"efficient":[176],"execution":[177],"edge":[179],"hardware.":[180],"It":[181],"processes":[182],"frame":[184],"16.6":[186],"s,":[187],"utilizing":[188],"only":[189],"38.4%":[190],"Pi\u2019s":[194],"RAM":[195],"50.9%":[197],"CPU.":[200],"integrated":[202],"module":[204],"enables":[205],"transmit":[209],"critical":[210,235],"over":[212],"long":[213],"distances":[214],"without":[215],"need":[217],"cloud":[219],"connectivity":[220],"or":[221],"central":[223],"server.":[224],"demonstrates":[227],"capability":[229],"autonomous,":[231],"real-time":[232],"across":[234],"domains":[236],"including":[237],"military":[238],"borders,":[239],"urban":[240],"airspaces,":[241],"civilian":[243],"infrastructure.":[244]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-20T00:00:00"}
