Search alternatives:
resourcess » sourcess (Expand Search)
resource » source (Expand Search)
functions » function (Expand Search)
resourcess » sourcess (Expand Search)
resource » source (Expand Search)
functions » function (Expand Search)
-
761
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
762
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
763
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
764
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
765
Green Chemistry Method for Analyzing Bisphenol A in Milk
Published 2025-01-01“…., its ability to mimic hormone functions). Studies have reported that BPA can leach into various food sources, including milk, a dietary staple for infants. …”
Get full text
Article -
766
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
767
Where there’s smoke there is fire: Türkiye and the international illegal wildlife trade
Published 2025-06-01“…By guiding policymakers, conservationists, and authorities, the study fosters international cooperation, optimal resource use, and endangered species protection. International wildlife trafficking can occur when detection and law enforcement measures fail in both the countries of origin and destination, and, where relevant, in transit countries, showing the necessity for governments worldwide to make the international illegal wildlife trade a priority.…”
Get full text
Article -
768
Practical Implementation of a Smart Home Model Using Arduino and Sensors
Published 2025-05-01“…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
Get full text
Article -
769
Investigation and Application of Water-Saving Monitoring Technology in Public Institutions
Published 2022-01-01“…Considering the characteristics of water use and the current situation of water facilities in public institutions,this study comprehensively employs the Internet of Things (IoT),cloud deployment,databases,three-dimensional (3D) visualization,and other advanced techniques to create a water-saving reconstruction scheme with integrated software and hardware for public institutions.Therefore,a smart water management platform for public institutions is built to implement advanced water-saving concepts and improve the water management level.The main research results are as follows:① By intelligent remote monitoring equipment,the multiclass water measurement network is designed to realize the fine collection of zonal water use data;② this study designs a reconstruction scheme of water facilities and explores the utilization mode of unconventional water sources to improve the utilization efficiency of water resources;③ multiple algorithms and statistical methods are used to analyze the time series of water use data,and thus this study realizes the analysis of pipeline network leakage and damage,identification of water use anomalies,and water-saving statistical analysis,and the investigation of water use laws;④ the platform with functions of monitoring and early warning is established to achieve real-time remote monitoring of water use,statistical analysis of historical water use,and identification and warning of pipe network leakage,so as to detect water anomalies in time and save water.The research results are first applied to the construction of the water-saving institution of the Pearl River Water Resources Commission to build a benchmark for the construction of water-saving institutions in the southern region.On the basis of application experience,the comprehensively integrated monitoring technology for water-saving in public institutions is developed,which provides a new idea for public institutions to save water.…”
Get full text
Article -
770
Probing Cosmic Isotropy with the FAST All Sky H i Survey
Published 2025-01-01“…We do not detect any statistically significant deviations from cosmic isotropy in the FASHI survey data.…”
Get full text
Article -
771
How to trace the origins of short-lived atmospheric species: an Arctic example
Published 2025-05-01“…Knowing the exact modeled tracer emission sources in WRF-Chem enables a precise quantification of the source detection accuracy. …”
Get full text
Article -
772
Microfluidic Sensors Integrated with Smartphones for Applications in Forensics, Agriculture, and Environmental Monitoring
Published 2025-07-01“…In environmental monitoring, these sensors allow the timely detection of pollutants in air, water, and soil, enabling quicker responses to hazards. …”
Get full text
Article -
773
Sequence analysis of tyrosine recombinases allows annotation of mobile genetic elements in prokaryotic genomes
Published 2021-05-01“…Tyrosine recombinase (YR) proteins drive MGE mobilization and could provide markers for MGE detection, but they constitute a diverse family also involved in housekeeping functions. …”
Get full text
Article -
774
Modern Concepts of Clinical and Diagnostic Criteria for Premature Ovarian Failure (Literature Review)
Published 2021-01-01“…An information search was carried out using Internet resources (PubMed, Web of Science, eLibrary.Ru), literary sources for the period 2015–2019 were analyzed. …”
Get full text
Article -
775
Genome-Wide Scan for Copy Number Variations in Chinese Merino Sheep Based on Ovine High-Density 600K SNP Arrays
Published 2024-10-01“…To generate a comprehensive CNVR map of the ovine genome, we conducted genome-wide CNV detection using genotyping data from 285 fine wool sheep. …”
Get full text
Article -
776
Development and characterization of a new TILLING population of common bread wheat (Triticum aestivum L.).
Published 2012-01-01“…The results indicate that this mutant population represents a useful resource for the wheat research community. We hope that the use of this reverse genetics resource will provide novel allelic diversity for wheat improvement and functional genomics.…”
Get full text
Article -
777
Advancing Predictive Healthcare: A Systematic Review of Transformer Models in Electronic Health Records
Published 2025-04-01“…Notably, case studies demonstrated a 30% boost in entity recognition accuracy in clinical notes and a 90% detection rate for malignancies in medical imaging. …”
Get full text
Article -
778
Balancing Performance and Portability: A Study on CsI(Tl) Crystal Sizes for Real-Time Gamma-Ray Spectrum and Dose Monitoring
Published 2024-07-01“…This was accomplished by calculating the detection efficiency and energy resolution through experimental measurements using standard gamma-ray sources and simulations using MCNP5. …”
Get full text
Article -
779
A quantum inspired machine learning approach for multimodal Parkinson’s disease screening
Published 2025-04-01“…Although machine-learning-based detection has shown promise for detecting Parkinson’s disease, most studies rely on a single feature for classification and can be error-prone due to the variability of symptoms between patients. …”
Get full text
Article -
780