Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
Showing 941 - 960 results of 1,810 for search '(( sources detection functions\ ) OR (( resource OR resources) detection function\ ))', query time: 0.26s Refine Results
  1. 941

    Complexity of immunobiology of tumor necrosis factor and novel anti-TNF therapy by S. А. Nedospasov

    Published 2023-06-01
    “…Systemic anti-cytokine therapy is known to be accompanied by undesirable side effects, which can hypothetically be explained by the neutralization of these protective functions. Thus, we developed prototypes of TNF blockers which limit the bioavailability of this cytokine only from its main “pathogenic” source – myeloid cells. …”
    Get full text
    Article
  2. 942

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  3. 943

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  4. 944
  5. 945

    High-Voltage CVT Fault Diagnosis Based on Effective Data Recognition and Multi-dimensional Information Fusion by Huishan ZHANG

    Published 2025-05-01
    “…In view of the poor identification of the effective data in online monitoring of high-voltage capacitor voltage transformer (CVT), this paper proposes a method for effective data identification based on the analysis of data correlation coefficients, with utilization of the data characteristics that multiple online monitoring data sources exhibit linear correlation. To address the prevalent problem in current high-voltage CVT fault diagnosis, such as limited information sources, poor accuracy, and significant interference in partial discharge devices leading to compromised fault signal detection and accuracy, a fault diagnosis method based on multi-dimensional information fusion is proposed. …”
    Get full text
    Article
  6. 946
  7. 947

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…The findings and recommendations presented in the paper can serve as a valuable resource for policymakers, regulatory bodies and organizations seeking to strengthen their financial fraud defense mechanisms and their internal audit function.…”
    Get full text
    Article
  8. 948

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  9. 949
  10. 950
  11. 951

    Renal Biopsy Pathological Tissue Segmentation: A Comprehensive Review and Experimental Analysis by Yan Liu, Taiping Wang, Xinxin He, Wei Wang, Qiang He, Juan Jin

    Published 2025-01-01
    “…This study provides a novel technical framework for precise renal pathological tissue segmentation and lays the foundation for future lesion detection and intelligent diagnostic applications.…”
    Get full text
    Article
  12. 952

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  13. 953
  14. 954
  15. 955

    Specific performance of IDT edge fingers by E. DANICKI, T, GAFKA

    Published 2014-05-01
    “…The theory shows that the edge strips of the system works differently as compared with these positioned inside the system. The familiar δ-function model however, can still be applied provided that the δ-sources of SAW are properly scaled and shifted from their position at the centres of the strips. …”
    Get full text
    Article
  16. 956

    Identification of multiple power quality disturbances in hybrid microgrid using deep stacked auto-encoder based bi-directional LSTM classifier by Ravi Kumar Jalli, Lipsa Priyadarshini, P.K. Dash, Ranjeeta Bisoi

    Published 2025-03-01
    “…In recent years microgrid technology has created widespread interest for the integration of renewable energy sources into main utility grid to supply clean energy to the end users. …”
    Get full text
    Article
  17. 957

    Photonics-Aided THz Integrated Sensing and Communication System Based on a Subcarrier-Chirp Inter-Embedded Waveform by Junhao Zhang, Mingzheng Lei, Min Zhu, Qingzhi Zhou, Bingchang Hua, Yuancheng Cai, Hao Li, Jiao Zhang, Zhengyi Liang, Yang Li, Xingyu Chen, Junjie Ding, Qing Zhong, Sha Zhu, Jianjun Yu

    Published 2025-01-01
    “…By fully utilizing the idle time-frequency resources of the LFMCW, a density of information-resolution quotient of up to 46.2 × 10-2 bit·s/m2 has been achieved. …”
    Get full text
    Article
  18. 958

    Application of Deep Dictionary Learning and Predefined Filters for Classification of Retinal Optical Coherence Tomography Images by Fariba Shaker, Zahra Baharlouei, Gerlind Plonka, Hossein Rabbani

    Published 2025-01-01
    “…In recent years, deep learning methods have excelled in Optical Coherence Tomography (OCT) image classification but demand high computational resources and extensive training data. We propose two effective methods for OCT image classification, combining the strength of deep learning with sparse representation of significant image features for improved detection of retinal abnormalities. …”
    Get full text
    Article
  19. 959

    Bovine PMN responses to extracellular vesicles released by Besnoitia besnoiti tachyzoites and B. besnoiti-infected host cells by Gabriel Espinosa, Constanza Salinas-Varas, Lisbeth Rojas-Barón, Christian Preußer, Elke Pogge von Strandmann, Ulrich Gärtner, Iván Conejeros, Carlos Hermosilla, Anja Taubert

    Published 2024-12-01
    “…Therefore, we tested whether exposure of bovine PMN to EVs from different cellular sources affects classical PMN effector functions and cytokine/chemokine secretion. …”
    Get full text
    Article
  20. 960

    Major diet of common carp (Cyprinus carpio L.) over different developmental stages in rice-field: Agroecological interactions between fishes and rice in Sichuan, China, based on DN... by Mengling Wu, Ruisen Lu, Wenhao Huang, Hongyi Liu, Yan Zou, Ling Tao, Yun Sun, Qiong Wang, Keyi Tang

    Published 2024-12-01
    “…We examined variations in the dietary compositions of common carp across three developmental stages to capture adaptations to seasonal changes in food resource availability. Additionally, we detected insect pests (species from the genera Macrosteles and Mythimna) and weeds (Eleusine indica, Alternanthera philoxeroides, Mazus japonicus, and Poa annua) in the diets of common carp, confirming the ecological benefits of common carp in rice fields by reducing insect pests and weeds. …”
    Get full text
    Article