Search alternatives:
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resourcess » resourcesss (Expand Search)
source » sources (Expand Search)
-
881
Structural Repetition Detector for multi-scale quantitative mapping of molecular complexes through microscopy
Published 2025-07-01“…Understanding these structures provides insights into their functional roles. While super-resolution microscopy can visualise such patterns, manual detection in large datasets is challenging and biased. …”
Get full text
Article -
882
Transcriptome analysis of corpora lutea in domestic cats (Felis catus) reveals strong differences in gene expression of various hormones, hormone receptors and regulators across di...
Published 2025-03-01“…The findings suggest that domestic cat CLs could also be a source of adipokines such as adiponectin or APELA. …”
Get full text
Article -
883
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
884
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
885
Life-threatening bleeding with intussusception due to gastrointestinal stromal tumor: a case report
Published 2019-10-01“…Abstract Background Massive intraluminal bleeding requires urgent intervention and management. However, the source of bleeding on the small intestine is difficult to determine. …”
Get full text
Article -
886
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
887
Obstacle shape determination by mobile robot sensor system using GP2Y0A (Sharp) type IR distance sensors
Published 2024-04-01“…However, such a sensor can only detect an obstacle and determine а distance to a certain point on its surface. …”
Get full text
Article -
888
-
889
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
890
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
891
Investigation on the Radar Scattering and Doppler Spectrum From Trimaran Based on the Motion of Six Degrees of Freedom
Published 2023-01-01“…Second, an accelerated geometrical optics and physical optics algorithm using the light source function (GO-PO/LSF) is proposed, which uses the light source function to realize the visibility judgment of surfaces and greatly reduces the computation time. …”
Get full text
Article -
892
Trade-offs and synergies for urban Production-Living-Ecological spatial Patterns-Comparison study between Fuzhou, China, and Saskatoon, Canada
Published 2024-12-01“…First, the paper identified the PLE spaces by integrating multi-source data, then analyzed the PLE spatial agglomeration characteristics by using the average nearest neighbor and kernel density analysis, finally detected the trade-offs and synergies between functional spaces by Spearman correlation and bivariate spatial autocorrelation. …”
Get full text
Article -
893
Milk phenomics: leveraging biological bonds with blood and infrared technologies for evaluating animal nutritional and health status
Published 2024-12-01“…Indeed, monitoring the nutritional and health status becomes paramount, aiming for an early detection of (sub)clinical health impairments. Given the mammary gland’s centrality in high-yielding dairy breeds, it’s unsurprising that the milk matrix provides insights about udder itself but also systemic metabolic function. …”
Get full text
Article -
894
mbctools: A User-Friendly Metabarcoding and Cross-Platform Pipeline for Analyzing Multiple Amplicon Sequencing Data across a Large Diversity of Organisms
Published 2024-12-01“…It provides functions for various tasks such as dereplication, clustering, chimera detection, and taxonomic assignment. …”
Get full text
Article -
895
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
Get full text
Article -
896
Reversed-Phase High-Performance Liquid Chromatography (RP-HPLC) Quantitative Analysis of L-Arginine in Freeze-Dried Red Dragon Fruits (<i>Hylocereus polyhizus</i>)
Published 2025-07-01“…Thus, this study opens further avenues toward exploring red dragon fruit as a natural source of L-arginine and advancing functional and nutraceutical products.…”
Get full text
Article -
897
A survey on the applications of transfer learning to enhance the performance of large language models in healthcare systems
Published 2025-06-01“…This research analyzes different transfer learning methods, including inductive, transductive, and unsupervised techniques, while demonstrating their effectiveness in detecting COVID-19 from chest X-rays and multi-source disease evaluation. …”
Get full text
Article -
898
Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite
Published 2020-01-01“…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
Get full text
Article -
899
Possibilities for computer-based assessment the quality indicators of Kashkaval cheese using image processing
Published 2025-01-01“…The current study presents two open-source software products – ImageJ and Scilab and their functionalities that are applied for image analysis of three samples of Kashkaval cheese, which are produced using different sodium chloride content. …”
Get full text
Article -
900
Faeces, Feathers and Flight: Understanding of Escape Behaviour in Incubating Eurasian Woodcocks (Scolopax rusticola)
Published 2025-07-01“…In this study, we investigate this behaviour in incubating female Eurasian woodcocks (Scolopax rusticola) using a large data set of 399 photographed nests sourced from various open‐source internet platforms. …”
Get full text
Article