Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
source » sources (Expand Search)
resource » resources (Expand Search)
resourcesss » resourcessss (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resourcesss » resourcessss (Expand Search)
-
801
-
802
-
803
-
804
A Scale-Aware and Discriminative Feature Learning Network for Fine-Grained Rigid Object Recognition
Published 2025-01-01Get full text
Article -
805
Estimation of Above-Ground Biomass for <italic>Dendrocalamus Giganteus</italic> Utilizing Spaceborne LiDAR GEDI Data
Published 2025-01-01“…The outcomes reveal that 1) the results showed that the power function emerged as the most efficacious model, with coefficient of determination (<italic>R</italic><sup>2</sup>) = 0.87 and root mean square error (RMSE) = 0.00051 Mg, in estimating the AGB of <italic>Dendrocalamus giganteus</italic>. 2) Based on the feature importance ranking of Random Forest, five variables were selected from the 40 extracted from GEDI, achieving RMSE = 8.21 Mg/ha and mean absolute error (MAE) = 6.12 Mg/ha. …”
Get full text
Article -
806
A Machine-Learning-Based Ocean-Current Velocity Inversion Model Using OCN From Sentinel-1 Observations
Published 2025-01-01Get full text
Article -
807
Infrared Satellite Detection Limits for Monitoring Atmospheric Ammonia
Published 2025-01-01Get full text
Article -
808
Wind Field Retrieval From Co-Polarized SAR Imagery Without External Wind Direction Assistance
Published 2025-01-01Get full text
Article -
809
Evaluation of cubic voxel effects on dose calculation for Iridium-192 high dose rate using TOPAS particle simulation
Published 2025-01-01“…Radial function analysis showed consistent results, with 0.5 mm³ voxels deviating up to 1.78% near the source and 7% at greater distances. …”
Get full text
Article -
810
PROBABILISTIC SEISMIC HAZARD ANALYSIS IN NORTHERN SUMATERA
Published 2019-01-01“…This method consists of source identification, source characterization, attenuation function selection, and seismic hazard counting. …”
Get full text
Article -
811
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
812
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
813
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
814
The On-Chip D-LMS Filter Design Method of Wireless Sensor Node Based on FPGA
Published 2020-01-01“…In the real-time position technology of underground shallow source, the signal denoising performance of wireless sensor nodes directly determines the location speed and accuracy of underground burst point. …”
Get full text
Article -
815
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
816
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
817
Reinforcement learning-based vehicle travel path reconstruction from sparse automatic licence plate recognition data
Published 2025-04-01“…First, the maximum entropy inverse reinforcement learning (MaxEnt IRL) method is employed to learn vehicle path selection strategy, i.e. the reward function, from the real data. …”
Get full text
Article -
818
Practical Implementation of a Smart Home Model Using Arduino and Sensors
Published 2025-05-01“…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
Get full text
Article -
819
TOPSIS method-based decision-making model for bipolar quadripartitioned neutrosophic environment
Published 2025-06-01“…In the domain of renewable energy, selecting the most suitable energy source involves navigating complex decision-making processes influenced by multiple criteria and inherent uncertainties. …”
Get full text
Article -
820
THE INFLUENCE OF SOIL DENSITY AND THE CHARACTER OF RADIOACTIVE 134Cs And 137Cs POLLUTION’S DISTRIBUTION ON in situ MEASUREMENTS
Published 2018-03-01“…As a result of theoretical estimations, the relationship between the effective radius of contaminated site is determined as a function of soil density.Analysis of the influence of radial zones of the cylindrical gamma source on in situ gamma-spectrometer showed that the main contribution to the total count rate of the pulse-amplitude spectrum is made by the radial zone with radius of up to 40 cm from the center of the probe, regardless of the thickness of the contaminated layer in geometry «Probe is located on the soil surface». …”
Get full text
Article