Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
source » sources (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
source » sources (Expand Search)
resource » resources (Expand Search)
resources » resourcess (Expand Search)
-
1001
Attitude of patients and doctors of government health care system to the basic principles of medical ethics
Published 2021-03-01“…Materials and methods. For the selection of respondents was used the representative sample based on gender and age of respondents (for the selection of patients), and by specialty of a medical workers (for doctors). …”
Get full text
Article -
1002
Multi-Robot Cooperative Simultaneous Localization and Mapping Algorithm Based on Sub-Graph Partitioning
Published 2025-05-01“…In terms of localization accuracy, the proposed method achieves an improvement of approximately 32.8% over other open source algorithms.…”
Get full text
Article -
1003
Morphological divergence driven by predation environment within and between species of Brachyrhaphis fishes.
Published 2014-01-01“…Our findings are important because they provide evidence that the same source of selection can drive similar phenotypic divergence independently at multiple divergence levels.…”
Get full text
Article -
1004
-
1005
Genome-Wide Scan for Copy Number Variations in Chinese Merino Sheep Based on Ovine High-Density 600K SNP Arrays
Published 2024-10-01“…Sheep are a vital species in the global agricultural economy, providing essential resources such as meat, milk, and wool. Merino sheep (Junken type) are a key breed of fine wool sheep in China. …”
Get full text
Article -
1006
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1007
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
1008
-
1009
Distorting Electrical Power of the Alternating Current in the Simplest Circuit with a Diode
Published 2019-10-01“…For the analysis of processes of formation the components of electrical power, a diagram of the simplest circuit containing a series-connected source of electromotive force, resistors and a diode is considered; also, the circuit was conditionally separated into a source and a consumer. …”
Get full text
Article -
1010
Optimal Dispatch of Power System with P2G-Wind-Thermal-Nuclear-Carbon Capture Units
Published 2024-01-01“…Finally, the minimization of system comprehensive operation costs is selected as the overall objective function. At the same time, the carbon trading mechanism is considered to build the simulation model on the Matlab platform to verify the effectiveness of the proposed model. …”
Get full text
Article -
1011
Sociocultural activities of wartime library within the context of the Ukrainian sociohumanitarian science priorities
Published 2024-01-01“…The purpose of the article is to examine legal documents of the National Academy of Sciences of Ukraine during full-scale war in Ukraine as a component of scientific and information source base for the libraries sociocultural activities and to highlight the organization of events on the corresponding topics in the leading scientific libraries. …”
Get full text
Article -
1012
-
1013
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
Get full text
Article -
1014
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
1015
-
1016
-
1017
Early Bearing Fault Diagnosis in PMSMs Based on HO-VMD and Weighted Evidence Fusion of Current–Vibration Signals
Published 2025-07-01“…The HO algorithm is employed to optimize the parameters of VMD for adaptive modal decomposition of current and vibration signals, resulting in the generation of intrinsic mode functions (IMFs). These IMFs are then selected and reconstructed based on their kurtosis to suppress noise and harmonic interference. …”
Get full text
Article -
1018
Spectral Properties of Suprathermal Protons Associated with Interplanetary Shocks from WIND/STICS Data
Published 2024-01-01“…“Suprathermal” designates energies above the bulk, “thermal” solar wind, including inner-source pickup ions, cometary ions, solar energetic particles, and suprathermal tail particles. …”
Get full text
Article -
1019
Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis
Published 2025-01-01“…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
Get full text
Article -
1020
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article