-
101
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
102
-
103
Failure Law of Sandstone and Identification of Premonitory Deterioration Information Based on Digital Image Correlation–Acoustic Emission Multi-Source Information Fusion
Published 2025-02-01“…Additionally, by introducing the derivative functions of the multi-source information function for quantitative analysis, a comprehensive evaluation method was proposed based on the multi-source information fusion monitoring to forewarn red sandstone failure by levels during loading. …”
Get full text
Article -
104
Near-source wastewater surveillance of SARS-CoV-2, norovirus, influenza virus and RSV across five different sites in the UK.
Published 2025-01-01“…The key findings are (1) near-source wastewater detections were linked to local events (staff sickness, enhanced cleaning, changing populations); (2) wastewater detections decreased in the order norovirus GII > norovirus GI > SARS-CoV-2 ≈ influenza A ≈ RSV A > influenza B ≈ RSV B; (3) correlation between near-source wastewater data and national surveillance data increases as a function of catchment size and viral prevalence (examples include the SARS-CoV-2 BA.4/BA.5 variant peak at a museum and wastewater tracking the winter norovirus season); (4) strong weekday periodicity in near-source wastewater SARS-CoV-2 detections, with the correlation against COVID-19 case numbers increasing when modelling variable lag times between faecal shedding onset and clinical diagnosis (R2 = 0.45 increases to 0.84-0.86); (5) a log-linear relationship between the frequency of wastewater SARS-CoV-2 detection and log(catchment size⋅viral prevalence) (R2 = 0.6914-0.9066). …”
Get full text
Article -
105
Multiepoch Observations of the Nearby Spiral Galaxy NGC 3938 with the Chandra X-Ray Observatory
Published 2025-01-01“…A total of 47 discrete merged sources from both epochs were detected at the ≈3 σ level or greater with the D25 radius. …”
Get full text
Article -
106
A spatial matrix factorization method to characterize ecological assemblages as a mixture of unobserved sources: An application to fish eDNA surveys
Published 2024-12-01“…We present a spatial matrix factorization method that identifies optimal eDNA sample assemblages—called pools—assuming that taxonomic unit composition is based on a fixed number of unknown sources. These sources, in turn, represent taxonomic units sharing similar habitat properties or characteristics. …”
Get full text
Article -
107
Characteristics of soil microbial phospholipid fatty acids in artificial, black-soil mountain degraded, and natural grasslands in the source region of the Three Rivers
Published 2025-08-01“…Background The source region of the Three Rivers is a concentrated distribution area of alpine grassland. …”
Get full text
Article -
108
Detecting and routing of dust event using remote sensing and numerical modeling in Isfahan Province
Published 2020-03-01“…In addition, numerical weather models alone are not capable of storm detection, which requires the use of dust detection methods based on data remote sensing. …”
Get full text
Article -
109
Development and validation of microwave-assisted extraction for phenolic compound profiling in diverse oyster mushrooms (Pleurotus spp.) sourced from various geographical regions
Published 2025-04-01“…Seven phenolic compounds—p-coumaric acid, t-cinnamic acid, p-hydroxybenzaldehyde, p-hydroxybenzoic acid, quercetin-3-glucoside, gallic acid, and vanillic acid—were effectively extracted and quantified using ultra-performance liquid chromatography with photodiode array detection. Application of this method across oyster mushroom samples from different geographical sources revealed significant variation in phenolic compound concentrations, with Pleurotus pulmonarius exhibiting the highest level of gallic acid at 433.90 ± 7.77 μg g−1 (DM) and Pleurotus ostreatus var. …”
Get full text
Article -
110
Optimized decomposition and identification method for multiple power quality disturbances
Published 2024-11-01Get full text
Article -
111
-
112
DIAMOND2GO: rapid Gene Ontology assignment and enrichment detection for functional genomics
Published 2025-08-01Get full text
Article -
113
Detection of Greenhouse and Typical Rural Buildings with Efficient Weighted YOLOv8 in Hebei Province, China
Published 2025-05-01“…The large-scale detection of greenhouses and rural buildings is important for natural resource surveys and farmland protection. …”
Get full text
Article -
114
Aptamer-Functionalized Gold Nanoparticle Assay for Rapid Visual Detection of Norovirus in Stool Samples
Published 2025-06-01“…Detection relies on MgCl<sub>2</sub>-induced changes in the color and absorbance of these aptamer-functionalized AuNPs. …”
Get full text
Article -
115
Robotic arm target detection algorithm combined with deep learning
Published 2024-12-01“…Existing target detection algorithms deployed on robotic arms would occupy a large amount of system resources, have poor real-time detection performance, and have a large number of model parameters. …”
Get full text
Article -
116
AC-YOLO: A lightweight ship detection model for SAR images based on YOLO11.
Published 2025-01-01“…However, existing SAR ship detection algorithms encounter two major challenges: limited detection accuracy and high computational cost, primarily due to the wide range of target scales, indistinct contour features, and complex background interference. …”
Get full text
Article -
117
Detection of Sensitive Malicious Android Functionalities Using Inter-Component Control-Flow Analysis
Published 2025-01-01“…The paper proposes a robust inter-component communication (ICC) based detection approach to identify such hidden functionality exploited by adversaries. …”
Get full text
Article -
118
A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps
Published 2024-07-01“…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
Get full text
Article -
119
Outlier Detection and Explanation Method Based on FOLOF Algorithm
Published 2025-05-01Get full text
Article -
120
An Improved YOLOv9s Algorithm for Underwater Object Detection
Published 2025-01-01“…However, the complex marine environment, poor resolution, color distortion in underwater optical imaging, and limited computational resources all affect the accuracy and efficiency of underwater object detection. …”
Get full text
Article