Search alternatives:
resourcessssssss » resourcesssssssss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
resourcessssssss » resourcesssssssss (Expand Search)
resource » resources (Expand Search)
source » sources (Expand Search)
-
901
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
902
In situ, modeled, and earth observation monitoring of surface water availability in West African rangelands
Published 2025-06-01“…The 12 locations can function as sentinel ponds to monitor local water availability. …”
Get full text
Article -
903
Life-threatening bleeding with intussusception due to gastrointestinal stromal tumor: a case report
Published 2019-10-01“…Abstract Background Massive intraluminal bleeding requires urgent intervention and management. However, the source of bleeding on the small intestine is difficult to determine. …”
Get full text
Article -
904
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
905
-
906
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
907
Effect of Perfluorane on Electric Pulse-Modified Red Blood Cell Membranes
Published 2005-06-01“…As a plasma substitute clinical medicine uses perfluorane that is an antishock, antiischemic, and cardioprotective agent having a function of transferring O2 and CO2. The authors have investigated the interaction of perfluorane particles with human erythrocytic membranes. …”
Get full text
Article -
908
Baseline levels of microplastics in agricultural soils obscure the effects of additional microplastics from recycled fertilizers
Published 2025-07-01“…Whilst it was observed from the fluxes that digestate can be a substantial source of microplastics to soils, the comparatively short time of application and the high background at our investigated sites leads to a obscured effect where digestate inputs serve a limited function.…”
Get full text
Article -
909
Unveiling smart contract vulnerabilities: Toward profiling smart contract vulnerabilities using enhanced genetic algorithm and generating benchmark dataset
Published 2025-06-01“…This dataset consists of 111,897 Solidity source code samples, ensuring the practical validation of the proposed approach. …”
Get full text
Article -
910
FAM3C Regulates Glioma Cell Proliferation, Invasion, Apoptosis, and Epithelial Mesenchymal Transition via the Notch Pathway
Published 2024-12-01“…Methods We utilized open‐source bioinformatics tools and platforms to analyze the transcriptional expression levels, prognosis, and correlation with clinical variables of FAM3C in gliomas, and subsequently, to hypothesize its potential molecular functions and possibly associated signaling pathways. …”
Get full text
Article -
911
Impulse Shaping Method Based on Bayesian Deconvolution
Published 2025-04-01“…The initial step of this method entailed expressing the measured pulse signal as the convolution of the current impulse pulse signal and the detection system response function. Then, the measured signal was expressed in the continuous time domain and decomposed into the form of an impulse signal and a double exponential kernel convolution by derivation. …”
Get full text
Article -
912
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
913
Energy filtering enables macromolecular MicroED data at sub-atomic resolution
Published 2025-03-01“…While direct electron detection essentially eliminates the read-out noise during MicroED data collection, other sources of noise remain and limit the measurement of faint high-resolution reflections. …”
Get full text
Article -
914
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
Get full text
Article -
915
Reversed-Phase High-Performance Liquid Chromatography (RP-HPLC) Quantitative Analysis of L-Arginine in Freeze-Dried Red Dragon Fruits (<i>Hylocereus polyhizus</i>)
Published 2025-07-01“…Thus, this study opens further avenues toward exploring red dragon fruit as a natural source of L-arginine and advancing functional and nutraceutical products.…”
Get full text
Article -
916
Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite
Published 2020-01-01“…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
Get full text
Article -
917
Possibilities for computer-based assessment the quality indicators of Kashkaval cheese using image processing
Published 2025-01-01“…The current study presents two open-source software products – ImageJ and Scilab and their functionalities that are applied for image analysis of three samples of Kashkaval cheese, which are produced using different sodium chloride content. …”
Get full text
Article -
918
Thrombus rooting in the pulmonary arteriovenous fistula in a patient with cryptogenic stroke, a case report
Published 2025-03-01Get full text
Article -
919
Multiphysics Coupling Model of Rock Mass considering Damage and Disturbance and Its Application
Published 2018-01-01Get full text
Article -
920
Conditions for the emergence of circumnutations in plant roots.
Published 2021-01-01“…Here we describe a model capable of replicating root growth behaviors, which we used to analyze the role of circumnuntations, revealing their emergence I) under gravitropic stress, as a combination of signal propagation and sensitivity to the signal carriers; II) as a result of the interplay between gravitropic and thigmotropic responses; and III) as a behavioral strategy to detect and react to resource gradients. The latter function requires the presence of a hypothetical internal oscillator whose parameters are regulated by the perception of environmental resources.…”
Get full text
Article