Suggested Topics within your search.
Suggested Topics within your search.
-
861
Investigation of the Impact of Light Colour on Surface Colour Perception: A Case Study on Red Surfaces
Published 2025-07-01“…These results offer valuable insights for the selection of suitable light sources not only for art exhibition spaces but also for other environments featuring colourful objects. …”
Get full text
Article -
862
Identification method of roof rock interface based on response characteristics of drilling parameters
Published 2025-02-01Get full text
Article -
863
Urban Hierarchy Migration Model and Impact Mechanism of Graduates Admitted to the Guangdong Provincial Civil Service Examination
Published 2025-02-01“…The decision-making and selection process in the selection mechanism for the migration mode of newly recruited graduates in the civil service examination is complex and dynamic, involving the interaction of multiple factors, such as government policy guidance, job characteristics, personal factors, and urban conditions, with objective limitations, personal abilities and resources, and subjective willingness. …”
Get full text
Article -
864
Accelerated Modeling of Transients in Electromagnetic Devices Based on Magnetoelectric Substitution Circuits
Published 2025-01-01“…The purpose of the work: The objective of this work is to develop a highly effective method for calculating electromagnetic transient processes in a coil with a ferromagnetic magnetic core connected to a voltage source. The method involves the use of nonlinear magnetoelectric substitution circuits for electromagnetic devices and a spectral method for representing solution functions using orthogonal polynomials. …”
Get full text
Article -
865
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
866
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
867
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
868
-
869
Study of Complex Impedance Dispersion Model for Two-Phase Laminar Flow
Published 2023-12-01Get full text
Article -
870
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
871
Gut microbiome composition and diversity of wild-caught and hatchery-bred milkfish (Chanos chanos) fry
Published 2025-09-01“…Milkfish is the most produced finfish in the Philippines, with approximately 75 % of its fry sourced from hatcheries. Despite numerous studies on gut microbiota of wild and cultured fish species, the diversity and functional roles of the milkfish fry gut microbiome remain poorly understood. …”
Get full text
Article -
872
Internal Speech in Natural Discourse Communication: A Systematic Review and Modeling
Published 2025-04-01“…The qualitative data selection, described in this paper, produced a corpus of data concerning the inner speech phenomena as deep stages of the processes of speaking and comprehension. …”
Get full text
Article -
873
When, where, and how prey pair antipredator behaviors to natural and anthropogenic mortality risks
Published 2025-07-01“…We used hidden Markov models to determine whether each covariate impacted the probability of transitioning between behavioral states and selection functions to determine whether deer spatially avoided each covariate. …”
Get full text
Article -
874
Apple leaf disease severity grading based on deep learning and the DRL-Watershed algorithm
Published 2025-08-01Get full text
Article -
875
Rapid Simulation of Floods by Considering the Spatial and Temporal Characteristics of Inundation
Published 2025-06-01Get full text
Article -
876
CREDIT POLICY OF A COMMERCIAL BANK IN CONDITIONS OF UNCERTAINTY OF THE ECONOMIC ENVIRONMENT
Published 2021-11-01“…The article examines the concept of «credit policy» through the prism of the functions outlined in the development strategy of the banking institution, which is primarily aimed at maximizing resources for rapid response to uncertainties of the external and internal environment. …”
Get full text
Article -
877
PATH PLANNING AND OBSTACLE AVOIDANCE METHODS FOR AUTONOMOUS MOBILE ROBOTS
Published 2024-12-01“…The modification of the classical artificial potential field method using the Gaussian function to describe repulsive forces is an example of optimizing the method for systems with constrained resources. …”
Get full text
Article -
878
T cell-related diagnostic model and the underlying mechanism related to PRF1-mediated glycolysis in sepsis: evidences from single-cell, bulk transcriptomics, and experiment validat...
Published 2025-08-01“…Methods Through downloading the single-cell RNA-sequencing (scRNA-seq) and RNA-seq data from online source, a series of bioinformatics methods including principal component analysis (PCA), differential expression analysis, and least absolute shrinkage and selection operator (LASSO) was used for selection of the T cell-related signatures. …”
Get full text
Article -
879
Developing a Comprehensive Physical Education Curriculum in Secondary Schools: Identifying and Exploring the Key Components of Content
Published 2022-12-01“…A systematic review of relevant literature was conducted using publications from the Vernadskyi National Library and sources in the Google search system. Keywords were used for the search in accordance with the topic of the study, and 26 sources were selected for analysis. …”
Get full text
Article -
880
A thorough assessment of 10-MDP primers in modern dental adhesive systems
Published 2024-09-01“…Study selection: Studies investigating the efficacy of 10-MDP primers were included. …”
Get full text
Article