Showing 961 - 980 results of 1,810 for search '((\ resource detection function\ ) OR ((\ source OR \ sources) detection functions\ ))', query time: 0.29s Refine Results
  1. 961

    Blind super-resolution network based on local fuzzy discriminative loss for fabric data augmentation by Ning Dai, Xiaohan Hu, Kaixin Xu, Xudong Hu, Yanhong Yuan, Bo Cao, Luhong Shi

    Published 2025-01-01
    “…In the field of fabric defect detection, the development of algorithms has been hindered by issues such as poor quality and limited quantity of open-source datasets. …”
    Get full text
    Article
  2. 962

    Experiments on the application of the infrasound method of remote monitoring of snow avalanches in the Khibiny Mountains by A. V. Fedorov, I. S. Fedorov, V. E. Asming, A. Yu. Motorin

    Published 2025-05-01
    “…Visual slope observations are still the main method of avalanche detection. As a result, avalanche statistics, especially in remote mountain areas, remain incomplete. …”
    Get full text
    Article
  3. 963

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  4. 964

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  5. 965

    INDICATORS AND CRITERIA FOR ASSESSMENT OF MULTIFUNCTIONAL DEVELOPMENT OF RURAL TERRITORIES by O. V. Kosenchuk, A. V. Zinich

    Published 2018-05-01
    “…In addition, it is established that to obtain reliable results, researchers need to have accessible and transparent source data. It is also concluded that the goals and objectives of the research on the rural areas’ development should be specified or measured.Conclusion. …”
    Get full text
    Article
  6. 966

    Urotensin-II: More Than a Mediator for Kidney by Ayşe Balat, Mithat Büyükçelik

    Published 2012-01-01
    “…Although both hU-II and its receptor, GPR14, are detected in several tissues, kidney is a major source of U-II in humans. …”
    Get full text
    Article
  7. 967

    Research on the Non-Uniform Temperature Field Distribution of Q355B Steel for Grain Storage under Fire Conditions by Min Yu, Zhen Cheng, Rui-Bin Gou, Nian Wang

    Published 2024-12-01
    “…The peak temperature Tmax and the heating rate vr at the fire source points of each test plate increased linearly with the increase of heat input Q at the fire source. …”
    Get full text
    Article
  8. 968

    Machine Learning-Driven GLCM Analysis of Structural MRI for Alzheimer’s Disease Diagnosis by Maria João Oliveira, Pedro Ribeiro, Pedro Miguel Rodrigues

    Published 2024-11-01
    “…<i>MCI</i>, the proposed model outperformed state-of-the-art imaging source studies by 0.1% and non-imaging source studies by 4.6%. …”
    Get full text
    Article
  9. 969

    An Intelligent Inspection and Scheduling Algorithm for Integrated Pipe Gallery Based on Cloud Robot by ZHOU Xiwei, SHANG Xiao, SHANG Xinjuan, YAN Maode, WANG Fafa

    Published 2020-01-01
    “…The algorithm has very strong exploring precision and variable function, which makes this algorithm of fewer iterations, and can effectively improve the real-time detection of pipeline leakage source in pipeline corridor. …”
    Get full text
    Article
  10. 970

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  11. 971

    Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design by Eleanor Mill, Wolfgang Garn, Chris Turner

    Published 2024-12-01
    “…The first of its kind, it leverages three distinct but complementary frameworks to support a user-centric and context-sensitive, post-hoc explanation for fraud detection. Using the principles of scenario-based design, it amalgamates two independent real-world sources to establish a realistic card fraud prediction scenario. …”
    Get full text
    Article
  12. 972

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  13. 973

    High-Throughput Indirect Monitoring of TORC1 Activation Using the pTOMAN-G Plasmid in Yeast by Melissa Gómez, Guilherme Rocha, Diego Ruiz, Claudio Martínez, Francisco Salinas, Eduardo Kessi-Pérez

    Published 2025-06-01
    “…The target of rapamycin complex 1 (TORC1) is a highly conserved protein complex whose primary function is to link nutrient availability to cell growth in eukaryotes, particularly nitrogen sources. …”
    Get full text
    Article
  14. 974

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  15. 975

    Numerical analysis of spectroscopic studies using supercontinuum generated by noise-like pulses by Christian A. Salcedo-Rodriguez, Eloisa Gallegos-Arellano, Julian M. Estudillo-Ayala, Juan M. Sierra-Hernandez, Jose D. Filoteo-Razo, Maximino R. Tapia-Garcia, Daniel A. Ramos-Gonzalez, Roberto Rojas-Laguna, Juan C. Hernandez-Garcia

    Published 2025-07-01
    “…Simulations were also performed for CH4, showing a visible absorption spectrum, thereby substantiating that these sources powered by NLPs can detect various gases with a high degree of selectivity.…”
    Get full text
    Article
  16. 976

    Advanced Microgrid Protection Utilizing Zero Sequence Components With Hard-Ware-in-the-Loop Testing by Zahra Ghanem, Feras Alasali, Naser El-Naily, Hassen Loukil, Haytham Y. Mustafa, Saad M. Saad, Abdelaziz Salah Saidi, William Holderbaum

    Published 2025-01-01
    “…Secondly, the study demonstrates the use of Configurable Function Blocks (CFCs) in digital relays to dynamically adjust relay settings based on zero sequence current detection. …”
    Get full text
    Article
  17. 977

    Nurses’ usage of validated tools to assess for delirium in general acute care settings: A scoping review protocol [version 1; peer review: 2 approved] by Aoibhinn Boyd, Leona Bannon, Marcia Kirwan

    Published 2025-02-01
    “…It often affects hospital in-patients and is associated with an increased risk of mortality, dementia, and functional decline. Delirium can be detected through the use of validated assessment tools, administered by nurses, and early detection is associated with improved outcomes for patients. …”
    Get full text
    Article
  18. 978

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
    Get full text
    Article
  19. 979

    Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite by Yeqiong Shi, Sainan Wang, Shuna Zhou, M. M. Kamruzzaman

    Published 2020-01-01
    “…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
    Get full text
    Article
  20. 980

    Heterogeneously integrated light emitting diodes and photodetectors in the metal-insulator-metal waveguide platform by Kwon Kyungmok, Park Junghoon, You Jong-Bum, Yu Kyoungsik

    Published 2023-05-01
    “…We experimentally verify the independent and combined operations of electrically-driven on-chip light sources and photodetectors.…”
    Get full text
    Article