-
21
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
22
Source Detection and Functional Connectivity of the Sensorimotor Cortex during Actual and Imaginary Limb Movement: A Preliminary Study on the Implementation of eConnectome in Motor Imagery Protocols
Published 2012-01-01“…Event-Related Desynchronization/Synchronization (ERD/ERS) of the mu-rhythm was used to evaluate MI performance. Source detection and FCNs were studied with eConnectome. …”
Get full text
Article -
23
MIF-YOLO: An Enhanced YOLO with Multi-Source Image Fusion for Autonomous Dead Chicken Detection
Published 2025-12-01“…Addressing the paucity of automated systems for the detection of dead poultry within large-scale agricultural settings, characterized by the onerous and time-consuming manual inspection processes, this study introduces an enhanced YOLO algorithm with multi-source image fusion (MIF-YOLO) for the autonomous identification of dead chicken. …”
Get full text
Article -
24
Advances in choroid-glaucoma structural-functional correlations using swept-source optical coherence tomography
Published 2025-08-01“…In this review, the pathophysiology of glaucoma is elucidated by combining swept-source optical coherence tomography (SS-OCT) results with noninvasive angiography data to comprehensively assess the anatomy and blood flow in the choroids of glaucoma patients. …”
Get full text
Article -
25
-
26
Metal surface defect detection using SLF-YOLO enhanced YOLOv8 model
Published 2025-04-01“…Abstract This paper addresses the industrial demand for precision and efficiency in metal surface defect detection by proposing SLF-YOLO, a lightweight object detection model designed for resource-constrained environments. …”
Get full text
Article -
27
-
28
The Cosmic Evolution of Fast Radio Bursts Inferred from the CHIME/FRB Baseband Catalog 1
Published 2025-01-01“…Testing two types of redshift evolution models suggests a likely combination of young and old formation channels. $3{1}_{-21}^{+31}$ % of FRB sources may track star formation, or correspondingly, FRB sources may have delay times of $1.9{4}_{-1.31}^{+1.54}$ Gyr. …”
Get full text
Article -
29
Analytical method for determining coordinates of the radiation source in a homogeneous medium
Published 2015-12-01“…The article considers the problem of determining the position of a radiation source in space, the wave speed and the start of radiation according to the sensors located in the same plane. …”
Get full text
Article -
30
-
31
Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems
Published 2024-01-01“…We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. …”
Get full text
Article -
32
A statistical approach to assess interspecific consumptive competition and functional redundancy in ephemeral resource uses using camera traps
Published 2024-07-01“…We extended time‐to‐detection occupancy modeling to quantify interspecific consumptive competition and redundancy of ecosystem functions through consumption between two species, while accounting for observation censoring. …”
Get full text
Article -
33
Improved UAV Target Detection Model for RT-DETR
Published 2025-01-01“…Furthermore, the Focaler-MPDIoU loss function has been developed to address the challenge of suboptimal localization accuracy for hard-to-detect targets and diminutive targets. …”
Get full text
Article -
34
A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks
Published 2025-08-01“…The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max–min game framework to dynamically allocate resources. …”
Get full text
Article -
35
Nanotechnologies associated to floral resources in agri-food sector
Published 2018-01-01Get full text
Article -
36
-
37
Fine-grained building function recognition with street-view images and GIS map data via geometry-aware semi-supervised learning
Published 2025-03-01“…In this work, we propose a geometry-aware semi-supervised method for fine-grained building function recognition, which effectively uses multi-source geoinformation data to achieve accurate function recognition in both single-city and cross-city scenarios. …”
Get full text
Article -
38
Reusable and robust fuzzy extractor for CRS-dependent sources
Published 2025-01-01“…Abstract Fuzzy extractors allow for the extraction and reproduction of a nearly uniform string from a noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the output string should remain pseudorandom under multiple extractions and any modification of public value should be detectable. …”
Get full text
Article -
39
An Improved Diagnosis Approach for Short-Circuit Fault Diagnosis in MPC-Based Current Source Inverter System
Published 2025-01-01“…Due to its excellent dynamic performance, the model predictive current control (MPC) method is widely adopted in power inverter systems, such as current source inverters (CSI). However, short-circuit faults in power switches are common in CSI systems, leading to a periodic output current distortion. …”
Get full text
Article -
40
Attraction and aversion of noctuid moths to fermented food sources coordinated by olfactory receptors from distinct gene families
Published 2025-01-01“…Conclusions Our findings suggest that this functional conservation is an olfactory adaptation that has allowed noctuid moths to extend their diet to fermented food sources.…”
Get full text
Article