Showing 881 - 900 results of 1,810 for search '(( resources detection functions ) OR (( source OR sources) detection function ))', query time: 0.34s Refine Results
  1. 881

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  2. 882

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  3. 883

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  4. 884

    Validation of the inadequate delivery of oxygen index in an adult cardiovascular intensive care unitCentral MessagePerspective by Heather Holman, BS, Dimitar Baronov, PhD, Jeff McMurray, MD, Arman Kilic, MD, Marc Katz, MD, Sanford Zeigler, MD

    Published 2024-12-01
    “…Conclusions: The IDO2 index is capable of detecting SvO2 ≤50% with good discriminatory function in non-MCS CVICU patients in a variety of monitoring situations. …”
    Get full text
    Article
  5. 885

    Assessing the impact of a rare synonymous variant in the <i>KNG1</i> gene on the development of hereditary angioedema by N. A. Pechnikova, Yu. V. Ostankova, M. A. Saitgalina, A. M. Bebyakov, A. A. Totolian

    Published 2024-01-01
    “…The material was a whole blood sample obtained from a woman with clinical manifestations of hereditary angioedema without a decrease in the levels and function of the C1 inhibitor. The research methods included whole exome sequencing, bioinformatic analysis of the KNG1 gene mutation using a number of databases and web resources. …”
    Get full text
    Article
  6. 886
  7. 887
  8. 888

    Design of the Field Protection and Signal Priority at Intersection System for Autonomous-rail Rapid Transit by SHI Yangyang, LIU Guangyong, WU Jinyong

    Published 2022-06-01
    “…It provides auxiliary driving information for the driver through automation equipment, realizes the functions of route protection, virtual section occupied/unoccupied detection, signal control, entering/leaving station detection, platform door linkage control, berth status detection and management in deport and so on, which improves system security and reduces driver working intensity. …”
    Get full text
    Article
  9. 889

    Big data for imaging assessment in glaucoma by Douglas R. da Costa, Felipe A. Medeiros

    Published 2024-09-01
    “…Leveraging vast data sources, these technologies promise to enhance clinical practice and public health outcomes by enabling earlier disease detection, progression forecasting, and deeper understanding of underlying mechanisms. …”
    Get full text
    Article
  10. 890

    Global Trends and Empirical Metrics in the Evaluation of Code Smells and Technical Debt: A Bibliometric Study by Ronald Henry Diaz Arrieta, Byron Leoncio Diaz Monroy, Luis Javier Castillo Heredia, Alexandra Gabriela Valenzuela Cobos

    Published 2025-01-01
    “…Among the critical factors that affect these attributes are code smells, indicators of structural deficiencies in the source code, which, although they do not directly affect functionality, significantly increase technical debt and maintenance costs. …”
    Get full text
    Article
  11. 891

    Near-infrared spectroscopy of the cerebellum in motor activation tasks by Yew Long Lo, Gerald Teck Heng Chia, Yan Teng Celeste Chen, Eng King Tan

    Published 2025-07-01
    “…Protocol 1 consisted of 5 optodes (4 sources and 1 detector, 4 recording channels) spaced 3 cm apart and comprising single-tipped LED light sources in conjunction with single-tipped fiber-optic detectors. …”
    Get full text
    Article
  12. 892

    New Rotation Periods from the Kepler Bonus Background Light Curves by Zachary R. Claytor, Jamie Tayar

    Published 2025-01-01
    “…However, due to Kepler’s large 4″ pixels, many of its light curves are at high risk of contamination from background sources. The new Kepler Bonus Background light curves are deblended using a point-spread function algorithm, providing light curves of over 400,000 new background sources in addition to over 200,000 reanalyzed Kepler prime targets. …”
    Get full text
    Article
  13. 893
  14. 894

    Green Chemistry Method for Analyzing Bisphenol A in Milk by Angela M. Encerrado Manriquez, Wen-Yee Lee

    Published 2025-01-01
    “…., its ability to mimic hormone functions). Studies have reported that BPA can leach into various food sources, including milk, a dietary staple for infants. …”
    Get full text
    Article
  15. 895

    Assessment of the nutritional constituents of Elaeis Guineensis Jacq exudates from different States of Nigeria by FI Obahiagbon, GE Ilori, JO Erhabor

    Published 2013-07-01
    “…The concentration of potassium was high in all the samples irrespective of their sources. The exudates could be classified as a rich source of nutrients that are needed in man, as some of the nutrients act as sources of energy, body builders, components of body organs and tissues, coenzymes and play notable roles in biochemical functions and deficiency diseases. …”
    Get full text
    Article
  16. 896
  17. 897
  18. 898

    CREDIT POLICY OF A COMMERCIAL BANK IN CONDITIONS OF UNCERTAINTY OF THE ECONOMIC ENVIRONMENT by О. Kovalova, M. Iorgachova

    Published 2021-11-01
    “…The article examines the concept of «credit policy» through the prism of the functions outlined in the development strategy of the banking institution, which is primarily aimed at maximizing resources for rapid response to uncertainties of the external and internal environment. …”
    Get full text
    Article
  19. 899

    The impact of early massive galaxy formation on the cosmic microwave background by Eda Gjergo, Pavel Kroupa

    Published 2025-08-01
    “…Yet, it emerges as a non-negligible source of CMB foreground contamination. Even in our most conservative estimates, massive ETGs account for 1.4% up to the full present-day CMB energy density.…”
    Get full text
    Article
  20. 900

    Predictive Capabilities and Limitations of Stream Interaction Region Observations at Different Solar Longitudes by R. C. Allen, G. C. Ho, L. K. Jian, G. M. Mason, S. K. Vines, D. Lario

    Published 2020-04-01
    “…Through comparing 10 years of SIRs/CIRs observed at L1 and at STEREO, we have investigated the probability of sequentially detecting SIRs/CIRs at two locations as a function of the difference in heliospheric longitude and latitudinal separation between the two spacecraft. …”
    Get full text
    Article