Showing 821 - 840 results of 1,810 for search '((( resourcessssss OR resources) detection functions ) OR ( sources detection function ))', query time: 0.30s Refine Results
  1. 821

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  2. 822

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  3. 823

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  4. 824
  5. 825

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  6. 826
  7. 827

    Distance Conversion Factors for In Situ H-Field Emissions Tests by Jordi Sole-Lloveras, Yasutoshi Yoshioka, Manuel Anon-Cancela, Thilo Kootz, Ferran Silva, Marco A. Azpurua

    Published 2025-01-01
    “…An algorithm is developed to extract the H-field strengths normalized to the reference distance and then, through methods for optimal detection of changepoints, such a normalized curve is fitted to a piece-wise linear function that becomes the generalized distance conversion factor, presented in the form of simplified equations. …”
    Get full text
    Article
  8. 828

    The influence of shot noise on the performance of phase singularity-based refractometric sensors by Maslova Valeria, Ermolaev Georgy, Andrianov Evgeny S., Arsenin Aleksey V., Volkov Valentyn S., Baranov Denis G.

    Published 2025-06-01
    “…This raises a natural question: What happens with the sensitivity and resolution of such a sensor when it operates close to a zero of the response function, where the detected signal may be greatly influenced by various noise sources? …”
    Get full text
    Article
  9. 829
  10. 830
  11. 831

    CREDIT POLICY OF A COMMERCIAL BANK IN CONDITIONS OF UNCERTAINTY OF THE ECONOMIC ENVIRONMENT by О. Kovalova, M. Iorgachova

    Published 2021-11-01
    “…The article examines the concept of «credit policy» through the prism of the functions outlined in the development strategy of the banking institution, which is primarily aimed at maximizing resources for rapid response to uncertainties of the external and internal environment. …”
    Get full text
    Article
  12. 832

    Soil microbial networks’ complexity as a primary driver of multifunctionality in photovoltaic power plants in the northwest region of China by Liuqing Zhao, Sumeng Xu, Sumeng Xu, Jinmei Zhao, Shujuan Chen, Xiaolong Liu, Xiuyuan Zheng, Xiuhui Wang, Zhao Zhu, Fei Gao, Bingzhe Fu, Shuxia Li

    Published 2025-04-01
    “…IntroductionExploiting photovoltaic power generation as a novel source of clean energy has become increasingly common in recent times. …”
    Get full text
    Article
  13. 833

    PATH PLANNING AND OBSTACLE AVOIDANCE METHODS FOR AUTONOMOUS MOBILE ROBOTS by Ihor Berizka

    Published 2024-12-01
    “…The modification of the classical artificial potential field method using the Gaussian function to describe repulsive forces is an example of optimizing the method for systems with constrained resources. …”
    Get full text
    Article
  14. 834

    Historical traces in Southern Grevena during Ottoman occupation by Vasileios D. Spanos

    Published 2024-11-01
    “…Regarding the content of each settlement, the time of its creation (or the first reference to the sources) and dissolution (if it does not exist today) of the settlements, the presentation of population data and data on ownership status, information on the economic and social life (functioning of schools, notable events, monuments of a mainly ecclesiastical nature) and anything else deemed worthy of mention were taken into account. …”
    Get full text
    Article
  15. 835

    Validation of the inadequate delivery of oxygen index in an adult cardiovascular intensive care unitCentral MessagePerspective by Heather Holman, BS, Dimitar Baronov, PhD, Jeff McMurray, MD, Arman Kilic, MD, Marc Katz, MD, Sanford Zeigler, MD

    Published 2024-12-01
    “…Conclusions: The IDO2 index is capable of detecting SvO2 ≤50% with good discriminatory function in non-MCS CVICU patients in a variety of monitoring situations. …”
    Get full text
    Article
  16. 836
  17. 837

    Big data for imaging assessment in glaucoma by Douglas R. da Costa, Felipe A. Medeiros

    Published 2024-09-01
    “…Leveraging vast data sources, these technologies promise to enhance clinical practice and public health outcomes by enabling earlier disease detection, progression forecasting, and deeper understanding of underlying mechanisms. …”
    Get full text
    Article
  18. 838
  19. 839

    Green Chemistry Method for Analyzing Bisphenol A in Milk by Angela M. Encerrado Manriquez, Wen-Yee Lee

    Published 2025-01-01
    “…., its ability to mimic hormone functions). Studies have reported that BPA can leach into various food sources, including milk, a dietary staple for infants. …”
    Get full text
    Article
  20. 840

    Radiation diagnostics of the state of ventilation and pulmonary circulation in patients with COPD by O. S. Sementsov, S. V. Stepanenko

    Published 2022-03-01
    “…Also a promising area is the use of functional CT (inspiratory-expiratory CT) - which should improve the assessment of respiratory function, including early detection of patients with COPD, which will promote the in time start of specific treatment, reduce episodes of exacerbations during the disease, assess the dynamics of the pathological process and the effectiveness of treatment, as well as improving the prognosis of work and life expectancy of patients. …”
    Get full text
    Article