{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T22:01:21Z","timestamp":1772748081784,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:00:00Z","timestamp":1772668800000},"content-version":"vor","delay-in-days":26,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00835-9","type":"journal-article","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T10:47:13Z","timestamp":1770461233000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparative analysis of cloud-based AI object detection services and YOLO11: performance, cost, and usability evaluation"],"prefix":"10.1186","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1416-264X","authenticated-orcid":false,"given":"Ricardo Beck","family":"Feiten","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4655-8889","authenticated-orcid":false,"given":"Edison Pignaton de","family":"Freitas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4957-9984","authenticated-orcid":false,"given":"Manuel M.","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,7]]},"reference":[{"key":"835_CR1","unstructured":"Jocher G, Qiu J Ultralytics yolo11 (2024) version 11.0.0. License, ORCID: 0000\u20130001\u20135950\u20136979, 0000\u20130002\u20137603\u20136750, 0000\u20130003\u20133783\u20137069, AGPL\u20133.0 License. https:\/\/github.com\/ultralytics\/ultralytics"},{"issue":"7","key":"835_CR2","doi-asserted-by":"publisher","first-page":"677","DOI":"10.3390\/machines11070677","volume":"11","author":"M Hussain","year":"2023","unstructured":"Hussain M (2023) Yolo-v1 to yolo-v8, the rise of yolo and its complementary nature toward digital manufacturing and industrial defect detection. Machines 11(7):677","journal-title":"Machines"},{"key":"835_CR3","unstructured":"Microsoft (2024) Azure Custom Vision: custom vision overview. https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/custom-vision-service\/overview . Accessed in: 2024"},{"key":"835_CR4","unstructured":"Amazon Web Services (2025) AWS Rekognition: image and video analysis. https:\/\/aws.amazon.com\/rekognition\/?nc=sn%26loc=1 . Accessed in: 2025"},{"key":"835_CR5","unstructured":"Google Cloud (2025) Vertex AI: train an image object detection model. https:\/\/docs.cloud.google.com\/vertex-ai\/docs\/image-data\/object-detection\/train-model . Accessed in: 2025"},{"key":"835_CR6","unstructured":"Roboflow (2025) Vision ai trends: computer vision in 2025. Available at: https:\/\/blog.roboflow.com\/vision-ai-trends\/"},{"key":"835_CR7","doi-asserted-by":"crossref","unstructured":"Alhosban A, Pesingu S, Kalyanam K (2024) CVL: a cloud vendor lock-in prediction framework. Mathematics 12(3):387. https:\/\/www.mdpi.com\/2227-7390\/12\/3\/387","DOI":"10.3390\/math12030387"},{"key":"835_CR8","doi-asserted-by":"crossref","unstructured":"Shukla S (2023) Utilizing cloud services for advanced e-health applications, enhancing diagnostics and treatment through vertex ai and vision api. In 2023 International Workshop on Biomedical Applications, Technologies and Sensors (BATS), pp 16\u201321","DOI":"10.1109\/BATS59463.2023.10303116"},{"key":"835_CR9","doi-asserted-by":"crossref","unstructured":"Anuwa MAM, Ramli NA, Zulkifli MZWM (2023) Car logo recognition using yolov8 and microsoft azure custom vision. In 2023 4th International Conference on Data Analytics for Business and Industry (ICDABI), pp 477\u2013481","DOI":"10.1109\/ICDABI60145.2023.10629291"},{"key":"835_CR10","doi-asserted-by":"crossref","unstructured":"Sharma V (2022) Object detection and recognition using amazon rekognition with boto3. In 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), pp 727\u2013732","DOI":"10.1109\/ICOEI53556.2022.9776884"},{"key":"835_CR11","doi-asserted-by":"crossref","unstructured":"Ambesh R, Sarfraz AB, Kapoor C, Joshi H, Patel H (2022) Drone detection using yolov4 and amazon rekognition. In 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), pp 896\u2013902","DOI":"10.1109\/ICAAIC53929.2022.9793204"},{"key":"835_CR12","doi-asserted-by":"crossref","unstructured":"Almeer S, Albalooshi F, Alhajeri A (2021) Oil spill detection system in the arabian gulf region: an azure machine-learning approach. In 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp 418\u2013422","DOI":"10.1109\/3ICT53449.2021.9581841"},{"key":"835_CR13","unstructured":"Jegham N, Koh CY, Abdelatti M, Hendawi A (2024) Evaluating the evolution of yolo (you only look once) models: a comprehensive benchmark study of yolo11 and its predecessors. arXiv preprint arXiv:2411.00201"},{"key":"835_CR14","doi-asserted-by":"crossref","unstructured":"Yin Y, Lin J, Sun N, Zhu Q, Zhang S, Zhang Y, Liu M (2021) Method for detection of unsafe actions in power field based on edge computing architecture. J Cloud Comput Adv Syst Appl 10(1):2021","DOI":"10.1186\/s13677-021-00234-w"},{"key":"835_CR15","doi-asserted-by":"crossref","unstructured":"Chen X, Sun S, Chen C, Song X, Qiulan W, Zhang F (2024) Small object lentinula edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing. J Cloud Comput Adv Syst Appl 13(1)","DOI":"10.1186\/s13677-023-00580-x"},{"key":"835_CR16","doi-asserted-by":"crossref","unstructured":"Rajendran P, Maloo S, Mitra R (2023) Anshu Chanchal, and Rajab Aburukba. Comparison of cloud-computing providers for deployment of object-detection deep learning models. Appl Sci 13(12577)","DOI":"10.3390\/app132312577"},{"key":"835_CR17","first-page":"1","volume":"18","author":"A Alkhatib","year":"2025","unstructured":"Alkhatib A, Shaheen A, Albustanji RN (2025) A comparative analysis of cloud computing services: AWS, Azure, and GCP. Int J Comput Digit Syst 18:1\u201315","journal-title":"Int J Comput Digit Syst"},{"key":"835_CR18","doi-asserted-by":"crossref","unstructured":"Junior LCM, Ulson JAC (2021) Real time weed detection using computer vision and deep learning. In 2021 14th IEEE International Conference on Industry Applications (INDUSCON), pp 1131\u20131137","DOI":"10.1109\/INDUSCON51756.2021.9529761"},{"key":"835_CR19","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin T-Y, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Doll\u00e1r P, Zitnick CL (2014) Microsoft coco: common objects in context. In: Fleet D, Pajdla T, Schiele B, Tuytelaars T (eds) Computer vision \u2013 ECCV 2014. Springer International Publishing, pp 740\u2013755"},{"key":"835_CR20","unstructured":"AWS Aws rekognition - documentation (2025). Available at: https:\/\/docs.aws.amazon.com\/rekognition\/latest\/customlabels-dg\/md-create-manifest-file.html"},{"key":"835_CR21","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.procs.2017.05.074","volume":"108","author":"V Campos","year":"2017","unstructured":"Campos V, Sastre F, Yag\u00fces M, Bellver M, Gir\u00f3 i Nieto X, Torres J (2017) Distributed training strategies for a computer vision deep learning algorithm on a distributed gpu cluster. Procedia Comput Sci 108:315\u2013324","journal-title":"Procedia Comput Sci"},{"issue":"8","key":"835_CR22","doi-asserted-by":"publisher","first-page":"3734","DOI":"10.3390\/app12083734","volume":"12","author":"D-J Shin","year":"2022","unstructured":"Shin D-J, Kim J-J (2022) A deep learning framework performance evaluation to use yolo in nvidia jetson platform. Appl Sci 12(8):3734","journal-title":"Appl Sci"},{"key":"835_CR23","unstructured":"PyLabel Project (2025) Github. PyLabel Project. [Online]. Available: https:\/\/github.com\/pylabel-project"},{"key":"835_CR24","doi-asserted-by":"crossref","unstructured":"Yacouby R, Axman D (2020) Probabilistic extension of precision, recall, and f1 score for more thorough evaluation of classification models. In Proceedings of the First Workshop on Evaluation and Comparison of NLP Systems, pp 79\u201391","DOI":"10.18653\/v1\/2020.eval4nlp-1.9"},{"issue":"10s","key":"835_CR25","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/3510413","volume":"54","author":"CFGD Santos","year":"2022","unstructured":"Santos CFGD, Papa JP (2022) Avoiding overfitting: a survey on regularization methods for convolutional neural networks. ACM Comput Surv 54(10s):213","journal-title":"ACM Comput Surv"},{"key":"835_CR26","unstructured":"G2. Compare amazon rekognition vs. azure custom vision service (2025). https:\/\/www.g2.com\/compare\/amazon-rekognition-vs-azure-custom-vision-service. Accessed: 2025-11-26"},{"key":"835_CR27","unstructured":"SphereGen Technologies (2024) Exploring azure custom vision for image recognition. https:\/\/www.spheregen.com\/exploring-azure-custom-vision-for-image-recognition\/. Accessed: 2025-11-26"},{"issue":"19","key":"835_CR28","doi-asserted-by":"publisher","first-page":"5983","DOI":"10.3390\/s25195983","volume":"25","author":"M Spichkova","year":"2025","unstructured":"Spichkova M, Severin A, Amornpatchara C, Fiona L (2025) Thuc Hi Tran, and Prathiksha Padmaprasad. Analysis of aws rekognition and azure custom vision performance in parking sign recognition. Sensors 25(19):5983","journal-title":"Sensors"},{"key":"835_CR29","doi-asserted-by":"publisher","unstructured":"An J, Lu M, Li G, Liu J, Wang C (2024) [Online]. Automated subway touch button detection using image process. J Big Data 11(1). Available: https:\/\/doi.org\/10.1186\/s40537-024-00941-6","DOI":"10.1186\/s40537-024-00941-6"},{"key":"835_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neunet.2015.07.007","volume":"71","author":"W Haibing","year":"2015","unstructured":"Haibing W, Xiaodong G (2015) Towards dropout training for convolutional neural networks. Neural Networks 71:1\u201310. https:\/\/doi.org\/10.1016\/j.neunet.2015.07.007","journal-title":"Neural Networks"},{"issue":"4","key":"835_CR31","first-page":"1","volume":"5","author":"J Opara-Martins","year":"2016","unstructured":"Opara-Martins J, Sahandi R, Tian F (2016) Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. J Cloud Comput: Adv Syst Appl 5(4):1\u201318","journal-title":"J Cloud Comput: Adv Syst And Appl"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00835-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00835-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00835-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T21:02:02Z","timestamp":1772744522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-025-00835-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,7]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["835"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00835-9","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,7]]},"assertion":[{"value":"7 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"31"}}