Search alternatives:
resource » source (Expand Search)
Showing 1,421 - 1,440 results of 2,992 for search '((\ sources selection functions\ ) OR (( (sources OR sources) OR resource) detection function\ ))', query time: 0.34s Refine Results
  1. 1421

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  2. 1422

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  3. 1423

    Precision medicine in premature ovarian insufficiency: a focus on the precision therapeutic strategies for mesenchymal stem cells by Rou Wang, Fengyuan Liu, Qiuyue Liao, Jiachen Wu, Lingjuan Wang, Kezhen Li

    Published 2025-07-01
    “…Key issues include the selection of appropriate MSCs sources, the optimization of culture conditions, and the determination of optimal transplantation protocols (encompassing dosage, administration route, and timing), all of which pose significant barriers to clinical translation of MSCs. …”
    Get full text
    Article
  4. 1424

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  5. 1425

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  6. 1426

    Examination and Tracing of Stable Isotopes of Carbon and Hydrogen in Diesel Oil from Different Regions by Han-yu ZHANG, Zhao-wei JIE, Han-yang ZHENG, Xiao-han ZHU, Wei-ya XIE, Can HU, Zhan-fang LIU, Hong-ling GUO, Jun ZHU, Hong-cheng MEI

    Published 2025-03-01
    “…Diesel is often used as an accelerant in arson cases, so identifying its source is crucial to the investigation. Stable isotope analysis is a method for detecting molecular elements at the element level. …”
    Get full text
    Article
  7. 1427

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  8. 1428

    Optimization of Adversarial Reprogramming for Transfer Learning on Closed Box Models by Alexander Bott, Moritz Siems, Alexander Puchta, Jurgen Fleischer

    Published 2025-01-01
    “…While it has been shown that this concept can work well in image classification, and a further modification has been developed to classify time series features, this work focuses primarily on the remaining key challenges such as the selection and comparison of appropriate loss functions, the optimisation of hyperparameters using Bayesian methods, and data labelling in the absence of ground truth. …”
    Get full text
    Article
  9. 1429

    Recreational Thematic Dominants in News TV Discourse by M. A. Gladko

    Published 2022-11-01
    “…The key tasks of the research are to identify the repertoire of thematic dominants of recreation, their functional characteristics, the specifics of participation in the construction of the news text, as well as a description of the recreation scale.Methodology and sources. …”
    Get full text
    Article
  10. 1430

    Assessment of Serum Vitamin D Levels and Evaluation of Knowledge, Attitude, and Practices of Vitamin D Deficiency among Emergency Health-care Workers at a Tertiary Care Center in N... by Sakshi Yadav, Prakash Ranjan Mishra, R. Rajalekshmi, Bharath Gopinath, Praveen Aggarwal, Akshaya Ramaswami, Paulina, Mohit Sharma

    Published 2024-01-01
    “…While most participants were aware of the active form of vitamin D, its sources and critical functions, knowledge about non-skeletal manifestations and measurable forms of vitamin D deficiency was limited. …”
    Get full text
    Article
  11. 1431

    Evaluation of the coupling coordination effect of Hefei Rail transit station area based on supply and demand matching. by Wangyang Gui, Mengnan Cheng, Tong Zhang, Yifei Guo, Bin Xu

    Published 2025-01-01
    “…The coupling of supply and demand in the rail transit station area is an important driving force for ensuring the balanced development between the traffic functions and the place performance of the rail transit station area. …”
    Get full text
    Article
  12. 1432

    Spontaneous blinking and brain health in aging: Large-scale evaluation of blink-related oscillations across the lifespan by Sujoy Ghosh Hajra, Jed A. Meltzer, Prerana Keerthi, Chloe Pappas, Allison B. Sekuler, Cam-CAN Group, Careesa Chang Liu

    Published 2025-01-01
    “…Crucially, these age-related differences were not observed in the behavioral measures of task performance such as reaction time and accuracy, suggesting that blink-related neural responses during the target detection task are more sensitive in capturing aging-related brain function changes compared to behavioral measures alone. …”
    Get full text
    Article
  13. 1433

    Spells and the Holy Tradition: On the Reception of the Biblical Heritage in the Verbal Magic of the Eastern Slavs by Tatyana A. Agapkina

    Published 2024-09-01
    “…The author investigates how these events and images get into the oral tradition, how they are assimilated into folklore, and what functions they perform in charms. The author relies on Holy Scripture and Sacred Tradition and uses apocryphal writings, liturgics, prayers, sermons, and other sources. …”
    Get full text
    Article
  14. 1434

    Methodology of recreation in the structure of the educational space by Viacheslav Zaytzev, Sergii Iermakov, Magdalena Hagner- Derengowska

    Published 2022-06-01
    “…Materials and Methods. Sources of information are publications in domestic literature. …”
    Get full text
    Article
  15. 1435

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
    Get full text
    Article
  16. 1436

    Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite by Yeqiong Shi, Sainan Wang, Shuna Zhou, M. M. Kamruzzaman

    Published 2020-01-01
    “…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
    Get full text
    Article
  17. 1437

    Compositional and nutritional value of lupin cultivars: Identifying high-protein seeds for enhanced protein isolate production and phytochemical valorisation by Pau Taberner-Pibernat, Albert Ribas-Agustí, Gisela Quinteros, Gerard Sabeña, Miguel López-Gómez, Rubén Domínguez-Valencia, Ricard Bou

    Published 2025-08-01
    “…These findings highlight the potential of lupin for diverse applications in the food and industrial sectors. Cultivar selection is essential to enhance protein extraction yields and colour, as well as to consider lupin as a source of various phytochemicals for valorisation.…”
    Get full text
    Article
  18. 1438

    Learning Transferable Convolutional Proxy by SMI-Based Matching Technique by Wei Jin, Nan Jia

    Published 2020-01-01
    “…The classification responses are also smoothened by manifolds of both the source domain and proxy space. By minimizing an objective function of SMI, classification error, and manifold regularization, we learn the convolutional networks of both source and target domains. …”
    Get full text
    Article
  19. 1439

    Rossby Number Regime, Convection Suppression, and Dynamo-generated Magnetism in Inflated Hot Jupiters by Albert Elias-López, Matteo Cantiello, Daniele Viganò, Fabio Del Sordo, Simranpreet Kaur, Clàudia Soriano-Guerrero

    Published 2025-01-01
    “…Specifically, we obtain the Rossby number Ro as a function of planetary depth and orbital period, after showing that tidal synchronization is likely valid for all HJs. …”
    Get full text
    Article
  20. 1440

    Celastrol-loaded ginsenoside Rg3 liposomes boost immunotherapy by remodeling obesity-related immunosuppressive tumor microenvironment in melanoma by Hongyan Zhang, Jingyi Huang, Yujie Li, Wanyu Jin, Jiale Wei, Ninghui Ma, Limei Shen, Mancang Gu, Chaofeng Mu, Donghang Xu, Yang Xiong

    Published 2025-05-01
    “…Obesity usually exacerbates the immunosuppressive tumor microenvironment (ITME), hindering CD8+ T cell infiltration and function, which further represents a significant barrier to the efficacy of immunotherapy. …”
    Get full text
    Article