-
881
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
882
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
883
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
884
Validation of the inadequate delivery of oxygen index in an adult cardiovascular intensive care unitCentral MessagePerspective
Published 2024-12-01“…Conclusions: The IDO2 index is capable of detecting SvO2 ≤50% with good discriminatory function in non-MCS CVICU patients in a variety of monitoring situations. …”
Get full text
Article -
885
Assessing the impact of a rare synonymous variant in the <i>KNG1</i> gene on the development of hereditary angioedema
Published 2024-01-01“…The material was a whole blood sample obtained from a woman with clinical manifestations of hereditary angioedema without a decrease in the levels and function of the C1 inhibitor. The research methods included whole exome sequencing, bioinformatic analysis of the KNG1 gene mutation using a number of databases and web resources. …”
Get full text
Article -
886
Study of Complex Impedance Dispersion Model for Two-Phase Laminar Flow
Published 2023-12-01Get full text
Article -
887
-
888
Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit
Published 2022-06-01“…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
Get full text
Article -
889
Big data for imaging assessment in glaucoma
Published 2024-09-01“…Leveraging vast data sources, these technologies promise to enhance clinical practice and public health outcomes by enabling earlier disease detection, progression forecasting, and deeper understanding of underlying mechanisms. …”
Get full text
Article -
890
Global Trends and Empirical Metrics in the Evaluation of Code Smells and Technical Debt: A Bibliometric Study
Published 2025-01-01“…Among the critical factors that affect these attributes are code smells, indicators of structural deficiencies in the source code, which, although they do not directly affect functionality, significantly increase technical debt and maintenance costs. …”
Get full text
Article -
891
Near-infrared spectroscopy of the cerebellum in motor activation tasks
Published 2025-07-01“…Protocol 1 consisted of 5 optodes (4 sources and 1 detector, 4 recording channels) spaced 3 cm apart and comprising single-tipped LED light sources in conjunction with single-tipped fiber-optic detectors. …”
Get full text
Article -
892
New Rotation Periods from the Kepler Bonus Background Light Curves
Published 2025-01-01“…However, due to Kepler’s large 4″ pixels, many of its light curves are at high risk of contamination from background sources. The new Kepler Bonus Background light curves are deblended using a point-spread function algorithm, providing light curves of over 400,000 new background sources in addition to over 200,000 reanalyzed Kepler prime targets. …”
Get full text
Article -
893
Insights into the Driving Factors of Methane Emission from Double-Season Rice Field Under Different Fertilization Practices in South China
Published 2024-11-01“…Paddy fields are the main agricultural source of greenhouse gas methane (CH<sub>4</sub>) emissions. …”
Get full text
Article -
894
Green Chemistry Method for Analyzing Bisphenol A in Milk
Published 2025-01-01“…., its ability to mimic hormone functions). Studies have reported that BPA can leach into various food sources, including milk, a dietary staple for infants. …”
Get full text
Article -
895
Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria
Published 2013-07-01“…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
Get full text
Article -
896
Apple leaf disease severity grading based on deep learning and the DRL-Watershed algorithm
Published 2025-08-01Get full text
Article -
897
Rapid Simulation of Floods by Considering the Spatial and Temporal Characteristics of Inundation
Published 2025-06-01Get full text
Article -
898
CREDIT POLICY OF A COMMERCIAL BANK IN CONDITIONS OF UNCERTAINTY OF THE ECONOMIC ENVIRONMENT
Published 2021-11-01“…The article examines the concept of «credit policy» through the prism of the functions outlined in the development strategy of the banking institution, which is primarily aimed at maximizing resources for rapid response to uncertainties of the external and internal environment. …”
Get full text
Article -
899
The impact of early massive galaxy formation on the cosmic microwave background
Published 2025-08-01“…Yet, it emerges as a non-negligible source of CMB foreground contamination. Even in our most conservative estimates, massive ETGs account for 1.4% up to the full present-day CMB energy density.…”
Get full text
Article -
900
Predictive Capabilities and Limitations of Stream Interaction Region Observations at Different Solar Longitudes
Published 2020-04-01“…Through comparing 10 years of SIRs/CIRs observed at L1 and at STEREO, we have investigated the probability of sequentially detecting SIRs/CIRs at two locations as a function of the difference in heliospheric longitude and latitudinal separation between the two spacecraft. …”
Get full text
Article