Search alternatives:
sourcess » source (Expand Search), success (Expand Search)
resource » source (Expand Search)
sourcess » source (Expand Search), success (Expand Search)
resource » source (Expand Search)
-
761
Feature selection using a multi-strategy improved parrot optimization algorithm in software defect prediction
Published 2025-04-01“…Software defect detection is a critical research topic in the field of software engineering, aiming to identify potential defects during the development process to improve software quality and reduce maintenance costs. …”
Get full text
Article -
762
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
763
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
764
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
765
-
766
Potential for non‐destructive astrochemistry using the ExoMars PanCam
Published 2008-06-01“…This non‐destructive triage allows prioritized deployment of organic detection experiments requiring sample destruction and/or expenditure of non‐replaceable resources. …”
Get full text
Article -
767
Unsustainable anthropogenic mortality threatens the long-term viability of lion populations in Mozambique.
Published 2025-01-01“…Our findings suggest that resilience to anthropogenic threats is largely a function of lion population size as well as resource and management capacity. …”
Get full text
Article -
768
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
769
Investigating the AGN-neutrino connection with public IceCube data
Published 2025-01-01“…We present the first application of a newly developed hierarchical Bayesian analysis framework for the detection of point-like sources of high-energy neutrinos. …”
Get full text
Article -
770
Feature Extraction and Classification of Power Quality Disturbances Using Optimized Tunable-Q Wavelet Transform and Incremental Support Vector Machine
Published 2024-01-01“…The widespread integration of renewable energy sources (RESs) into power systems using power electronics-based interface devices has led to a substantial rise in power quality (PQ) issues. …”
Get full text
Article -
771
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
772
Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid
Published 2024-12-01“…Battery energy storage systems (BESSs) play a crucial role in integrating renewable energy sources into microgrids. However, robust BESS controllers are needed to carry out this function properly. …”
Get full text
Article -
773
Practical Implementation of a Smart Home Model Using Arduino and Sensors
Published 2025-05-01“…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
Get full text
Article -
774
Energy filtering enables macromolecular MicroED data at sub-atomic resolution
Published 2025-03-01“…While direct electron detection essentially eliminates the read-out noise during MicroED data collection, other sources of noise remain and limit the measurement of faint high-resolution reflections. …”
Get full text
Article -
775
Specific performance of IDT edge fingers
Published 2014-05-01“…The theory shows that the edge strips of the system works differently as compared with these positioned inside the system. The familiar δ-function model however, can still be applied provided that the δ-sources of SAW are properly scaled and shifted from their position at the centres of the strips. …”
Get full text
Article -
776
Distribution, behavior and diet of the Asiatic black bear in human modified landscapes
Published 2024-11-01“…Elevation, precipitation, village density, and PA size did not substantially influence occupancy. Black bear detection probability became 100 % only above 14 km survey effort, indicating its overall rarity, and bears were much more easily detected during and after rainfall. …”
Get full text
Article -
777
State of the art in remote sensing monitoring of carbon dynamics in African tropical forests
Published 2025-03-01“…Future developments in remote sensing should examine how multi-sensor integration of high-resolution data from instruments such as Planet, Tandem-X, SPOT and improved AI methods can refine forest composition, carbon storage and function maps, enhance large-scale monitoring of tree height and biomass dynamics, and improve forest degradation and deforestation detection down to tree level. …”
Get full text
Article -
778
High-Voltage CVT Fault Diagnosis Based on Effective Data Recognition and Multi-dimensional Information Fusion
Published 2025-05-01“…In view of the poor identification of the effective data in online monitoring of high-voltage capacitor voltage transformer (CVT), this paper proposes a method for effective data identification based on the analysis of data correlation coefficients, with utilization of the data characteristics that multiple online monitoring data sources exhibit linear correlation. To address the prevalent problem in current high-voltage CVT fault diagnosis, such as limited information sources, poor accuracy, and significant interference in partial discharge devices leading to compromised fault signal detection and accuracy, a fault diagnosis method based on multi-dimensional information fusion is proposed. …”
Get full text
Article -
779
Microfluidic Sensors Integrated with Smartphones for Applications in Forensics, Agriculture, and Environmental Monitoring
Published 2025-07-01“…In environmental monitoring, these sensors allow the timely detection of pollutants in air, water, and soil, enabling quicker responses to hazards. …”
Get full text
Article -
780
Sequence analysis of tyrosine recombinases allows annotation of mobile genetic elements in prokaryotic genomes
Published 2021-05-01“…Tyrosine recombinase (YR) proteins drive MGE mobilization and could provide markers for MGE detection, but they constitute a diverse family also involved in housekeeping functions. …”
Get full text
Article