Search alternatives:
resource » source (Expand Search)
Showing 1,161 - 1,180 results of 2,992 for search '((\ sources selection function\ ) OR (( (sources OR sources) OR resource) detection functions\ ))', query time: 0.35s Refine Results
  1. 1161

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  2. 1162

    Construction and Completion of the Knowledge Graph for Cow Estrus with the Association Rule Mining by Zhiwei Cheng, Luyu Ding, Cheng Peng, Helong Yu, Baozhu Yang, Ligen Yu, Qifeng Li

    Published 2025-05-01
    “…Additionally, we employed an enhanced Iforest-OCSVM anomaly detection model to assess the performance of the association rules in detecting abnormal estrus. …”
    Get full text
    Article
  3. 1163

    Diagnostic potential of the B9D2 gene in colorectal cancer based on whole blood gene expression data and machine learning by Zhaorui Wang, Yongcheng Fu, Haozhe Zhang, Na Liu, Ningjing Lei

    Published 2025-08-01
    “…The B9D2 gene, which is essential for ciliary function, has been rarely explored in CRC. This study is the first to investigate the diagnostic potential of B9D2 in CRC, using bioinformatics and machine learning to uncover its novel role in early detection, with implications for clinical translation. …”
    Get full text
    Article
  4. 1164

    AiWatch: A Distributed Video Surveillance System Using Artificial Intelligence and Digital Twins Technologies by Alessio Ferone, Antonio Maratea, Francesco Camastra, Angelo Ciaramella, Antonino Staiano, Marco Lettiero, Angelo Polizio, Francesco Lombardi, Antonio Junior Spoleto

    Published 2025-05-01
    “…Recent advancements in this technology have led to enhanced functionality, remarkable accuracy, and reduced costs for consumers. …”
    Get full text
    Article
  5. 1165

    Global analysis of CP $$ \mathcal{CP} $$ -violation in atoms, molecules and role of medium-heavy systems by Konstantin Gaul, Robert Berger

    Published 2024-08-01
    “…Abstract Detection of parity P $$ \left(\mathcal{P}\right) $$ and time-reversal T $$ \left(\mathcal{T}\right) $$ symmetry-odd electric dipole moments (EDMs) within currently achievable resolution would evidence physics beyond the Standard Model of particle physics. …”
    Get full text
    Article
  6. 1166

    JWST/NIRCam Narrowband Survey of Paβ Emitters in the Spiderweb Protocluster at z = 2.16 by Rhythm Shimakawa, J. M. Pérez-Martínez, Helmut Dannerbauer, Yusei Koyama, Tadayuki Kodama, Pablo G. Pérez-González, Chiara D’Eugenio, Yuheng Zhang, Abdurrahman Naufal, Kazuki Daikuhara

    Published 2024-01-01
    “…The weight-corrected color–magnitude diagram obtained 57 sources showing narrowband excesses, 41 of which satisfy further color selection criteria for limiting the sample to Pa β emitter candidates at z ∼ 2.16, and 24 of them do not have H α emitter counterparts. …”
    Get full text
    Article
  7. 1167

    Big data for imaging assessment in glaucoma by Douglas R. da Costa, Felipe A. Medeiros

    Published 2024-09-01
    “…Leveraging vast data sources, these technologies promise to enhance clinical practice and public health outcomes by enabling earlier disease detection, progression forecasting, and deeper understanding of underlying mechanisms. …”
    Get full text
    Article
  8. 1168

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  9. 1169
  10. 1170

    Implementation of stochastic signal processing algorithms in radar CAD by M. Yu. Konopel'kin, S. V. Petrov, D. A. Smirnyagina

    Published 2022-10-01
    “…A simulation model of a sector surveillance radar with a digital antenna array was created in the radar CAD visual functional editor. The passive channel included the following algorithms: algorithm for detecting stochastic signals; algorithm for estimating the number of stochastic signals; direction finding algorithm for stochastic signal sources; adaptive spatial filtering algorithm. …”
    Get full text
    Article
  11. 1171

    Are Supernovae Responsible for the Gamma Ray Spectrum from the Galactic Center? by Todor Stanev

    Published 2014-12-01
    “…We discuss the supernova remnants distribution as a function of the galactic longitude and compare their positions to that of the detected TeV gamma ray sources. …”
    Get full text
    Article
  12. 1172

    Motivation and stimulation of employment specialists in the sphere of information technologies by S. Bazhenov

    Published 2016-04-01
    “…In conducting this study the main sources of raw data served as the information contained in scientific, reference, periodical literature on the subject in question, including the sources of information and telecommunications network "Internet". …”
    Get full text
    Article
  13. 1173

    Specific performance of IDT edge fingers by E. DANICKI, T, GAFKA

    Published 2014-05-01
    “…The theory shows that the edge strips of the system works differently as compared with these positioned inside the system. The familiar δ-function model however, can still be applied provided that the δ-sources of SAW are properly scaled and shifted from their position at the centres of the strips. …”
    Get full text
    Article
  14. 1174

    Energy filtering enables macromolecular MicroED data at sub-atomic resolution by Max T. B. Clabbers, Johan Hattne, Michael W. Martynowycz, Tamir Gonen

    Published 2025-03-01
    “…While direct electron detection essentially eliminates the read-out noise during MicroED data collection, other sources of noise remain and limit the measurement of faint high-resolution reflections. …”
    Get full text
    Article
  15. 1175
  16. 1176

    Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid by Syeda Afra Saiara, Mohd. Hasan Ali

    Published 2024-12-01
    “…Battery energy storage systems (BESSs) play a crucial role in integrating renewable energy sources into microgrids. However, robust BESS controllers are needed to carry out this function properly. …”
    Get full text
    Article
  17. 1177

    REVISITING THE ORGANIZATION OF A CLINICAL (MEDICAL) PSYCHOLOGIST WORK AT THE FIRST STAGE OF MEDICAL REHABILITATION IN THE CONDITIONS OF THE INTENSIVE CARE UNIT (ICU) BY THE EXAMPLE... by Алена Валентиновна Слекишина, Марина Григорьевна Жестикова, Светлана Станиславовна Зиборова

    Published 2025-03-01
    “…There is currently a pressing need to devise a way of neurophycological diagnostics of higher mental functions which would allow to detect cognitive impairment in patients in the ICU during the first stages of medical rehabilitation taking into account working hours constraints.…”
    Get full text
    Article
  18. 1178

    Torsion Pendulum Apparatus for Ground Testing of Space Inertial Sensor by Shaoxin Wang, Zuolei Wang, Dongxu Liu, Peng Dong, Jian Min, Ziren Luo, Keqi Qi, Jungang Lei

    Published 2024-12-01
    “…The precise movement of the test mass along a geodesic is crucial for gravitational wave detection in space. To maintain this motion, the core payload-inertial sensor incorporates multiple functional units designed to mitigate various sources of stray force noise affecting the test mass. …”
    Get full text
    Article
  19. 1179

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  20. 1180

    Mobile phone encryption as an obstacle in criminal investigation: Review of comparative solutions by Pisarić Milana

    Published 2021-01-01
    “…In detecting criminal offences, the police increasingly rely on electronic evidence. …”
    Get full text
    Article