Search alternatives:
functions » function (Expand Search)
Showing 821 - 840 results of 2,295 for search '(( resource detection functions ) OR (( source OR sources) selection functions ))', query time: 0.27s Refine Results
  1. 821

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  2. 822

    mdciao: Accessible Analysis and Visualization of Molecular Dynamics Simulation Data. by Guillermo Pérez-Hernández, Peter W Hildebrand

    Published 2025-04-01
    “…We present mdciao, an open-source command line tool and Python Application-Programming-Interface (API) for easy, one-shot analysis and representation of molecular dynamics (MD) simulation data. …”
    Get full text
    Article
  3. 823

    Investigation of the Impact of Light Colour on Surface Colour Perception: A Case Study on Red Surfaces by Havva Gül Sümer, Leyla Dokuzer Öztürk

    Published 2025-07-01
    “…These results offer valuable insights for the selection of suitable light sources not only for art exhibition spaces but also for other environments featuring colourful objects. …”
    Get full text
    Article
  4. 824

    Guarantees of family stability in the Holy Quran and the Prophet's Sunnah | ضمانات الاستقرار الأسري في القرآن الكريم والسنة النبوية (دراسة وصفية تحليلية)... by Aisha Shareef

    Published 2020-12-01
    “…I graduated the verses and attributed them to their walls، and the hadiths came out of their thoughts and drew up a list of sources and references that they relied on in the research.…”
    Get full text
    Article
  5. 825

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  6. 826

    Accelerated Modeling of Transients in Electromagnetic Devices Based on Magnetoelectric Substitution Circuits by Sergii Tykhovod, Ihor Orlovskyi

    Published 2025-01-01
    “…The purpose of the work: The objective of this work is to develop a highly effective method for calculating electromagnetic transient processes in a coil with a ferromagnetic magnetic core connected to a voltage source. The method involves the use of nonlinear magnetoelectric substitution circuits for electromagnetic devices and a spectral method for representing solution functions using orthogonal polynomials. …”
    Get full text
    Article
  7. 827

    Diverse-Origin Exosomes Therapeutic Strategies for Diabetic Wound Healing by Wang F, Yao J, Zuo H, Jiao Y, Wu J, Meng Z

    Published 2025-06-01
    “…As exosomes from different sources have different composition and function, the characteristics of their source must be considered when using them. …”
    Get full text
    Article
  8. 828

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  9. 829

    Aperçu sanitaire et architectural des bâtiments de transit pour les émigrants européens by Anne Bosser

    Published 2017-02-01
    “…For transatlantic shipping companies, this migratory movement became a major commercial activity and the transport of indigent migrants a leading source of profits. These companies took over the regulation of emigration in the ports of departure in Europe. …”
    Get full text
    Article
  10. 830

    Numerical modeling of complex radiative heat transfer by N. I. Moskalenko, L. V. Rodionov, M. S. Khamidullina, I. A. Afanasyev

    Published 2017-12-01
    “…The application of numerical simulation of the fine structure of the absorption and emission in the complex problems of radiative heat transfer is consider when the structural characteristics of the environment and the boundary conditions are different strong inhomogeneities in temperature, chemical composition and distribution of the radiation sources. The very nature of radiative heat transfer and temperature variation trends over time are determined by the acute effects of selection of the spectra and their modeling require knowledge of spectral line parameters: intensity, half-width position of the centers, contours. …”
    Get full text
    Article
  11. 831

    When, where, and how prey pair antipredator behaviors to natural and anthropogenic mortality risks by Michael E. Egan, Abigail M. Weber, Nicole Gorman, Michael W. Eichholz, Daniel Skinner, Peter E. Schlichting, Guillaume Bastille-Rousseau

    Published 2025-07-01
    “…We used hidden Markov models to determine whether each covariate impacted the probability of transitioning between behavioral states and selection functions to determine whether deer spatially avoided each covariate. …”
    Get full text
    Article
  12. 832

    Adoptive transfer of natural killer cells in therapeutic treatment of COVID-19 patients by Abdulaziz Alamri

    Published 2025-02-01
    “…Methods Various NK cell sources for adoptive therapy are discussed, including peripheral blood, cord blood, and genetically engineered NK cells. …”
    Get full text
    Article
  13. 833

    Gut microbiome composition and diversity of wild-caught and hatchery-bred milkfish (Chanos chanos) fry by Gardel Xyza L. Silvederio, Therese F. Javellana, Ande Bryle N. Genciana, Maria Alexandra G. Fontanilla, Rex Ferdinand M. Traifalgar, Fredson H. Huervana, Carmelo S. del Castillo

    Published 2025-09-01
    “…Milkfish is the most produced finfish in the Philippines, with approximately 75 % of its fry sourced from hatcheries. Despite numerous studies on gut microbiota of wild and cultured fish species, the diversity and functional roles of the milkfish fry gut microbiome remain poorly understood. …”
    Get full text
    Article
  14. 834

    T cell-related diagnostic model and the underlying mechanism related to PRF1-mediated glycolysis in sepsis: evidences from single-cell, bulk transcriptomics, and experiment validat... by Fu Tian, Hui Chen, Zhicheng Huang, Kai Qiu

    Published 2025-08-01
    “…Methods Through downloading the single-cell RNA-sequencing (scRNA-seq) and RNA-seq data from online source, a series of bioinformatics methods including principal component analysis (PCA), differential expression analysis, and least absolute shrinkage and selection operator (LASSO) was used for selection of the T cell-related signatures. …”
    Get full text
    Article
  15. 835

    FORECASTING THE GROUNDWATER LEVEL OF CEMENT RAW MATERIALS DEPOSIT BASED ON DYNAMIC NEIGHBORHOOD MODELS by I. A. Sedykh

    Published 2018-09-01
    “…The development of a mathematical model for the groundwater level of a deposit of cement raw materials located in the Zadonian-Yelets aquifer, which is the principal domestic water supply source for the city of Lipetsk, is considered. Therefore, it is necessary to provide ongoing monitoring and to have the possibility to  predict the water level under the field development. …”
    Get full text
    Article
  16. 836

    Psychology or Physiology? Choosing the Right Color for Interior Spaces to Support Occupants’ Healthy Circadian Rhythm at Night by Mansoureh Sadat Jalali, Ronald B. Gibbons, James R. Jones

    Published 2025-07-01
    “…The human circadian rhythm is connected to the body’s endogenous clock and can influence people’s natural sleeping habits as well as a variety of other biological functions. According to research, various electric light sources in interior locations can disrupt the human circadian rhythm. …”
    Get full text
    Article
  17. 837

    Biological properties of cord blood hematopoietic stem cells by S. A. Rumiantsev, E. Yu. Osipova, S. E. Ipatov, T. V. Shamanskaya, O. A. Mayorova, A. G. Rumyantsev

    Published 2014-07-01
    “…Phased developments of the technology of stem cells detection and selection, their proliferation, differentiation and function assessment using cultivation in vitro and in vivo in animal model was described. …”
    Get full text
    Article
  18. 838

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  19. 839

    AI-powered literature search: some observations and concerns by Farooq Azam Rathore, Fareeha Farooq

    Published 2024-12-01
    “…This raises questions about the data sources utilized by these AI tools and the overall reliability of their outputs. …”
    Get full text
    Article
  20. 840

    Optimization of Adversarial Reprogramming for Transfer Learning on Closed Box Models by Alexander Bott, Moritz Siems, Alexander Puchta, Jurgen Fleischer

    Published 2025-01-01
    “…While it has been shown that this concept can work well in image classification, and a further modification has been developed to classify time series features, this work focuses primarily on the remaining key challenges such as the selection and comparison of appropriate loss functions, the optimisation of hyperparameters using Bayesian methods, and data labelling in the absence of ground truth. …”
    Get full text
    Article