Showing 741 - 760 results of 993 for search 'Resources detection function', query time: 0.17s Refine Results
  1. 741
  2. 742
  3. 743
  4. 744
  5. 745

    Phenolic Content, Antioxidant Activity and Quality Characteristics of Hulled Wheats Originating from Türkiye by Fatma Ruveyda Alkan, Buket Çetiner, Hüseyin Akşit, Samed Şimşek

    Published 2025-07-01
    “…This study investigated selected quality and functional characteristics of 17 hulled wheat accessions (Triticum monococcum and Triticum dicoccum) preserved in the Türkiye Seed Gene Bank, along using four modern wheat cultivars (Triticum aestivum L. and Triticum durum Desf.). …”
    Get full text
    Article
  6. 746
  7. 747
  8. 748

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  9. 749

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  10. 750

    Severe pregnancy-associated atypical hemolytic uremia syndrome in the context of the COVID-19 pandemic: a novel survival case report by Yan Yang, Xiao-jin Li, Hua-Yan Yuan, Jing-Jing Xiong, Peng-Fei Li, Zhen Wang

    Published 2025-01-01
    “…Post-treatment evaluation showed normalized complement C3 and C4 levels, stabilized platelet and hemoglobin levels, and gradual normalization of liver function. Renal function improved gradually, and a bone marrow biopsy revealed no fragmented red blood cells. …”
    Get full text
    Article
  11. 751
  12. 752

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  13. 753
  14. 754

    An Interdisciplinary Ecosystem for the Prevention of Cardiotoxicity in Older Patients With Breast Cancer: Protocol for a Prospective and Multicentric Study by Gaia Giulia Angela Sacco, Ketti Mazzocco, Anastasia Constantinidou, Andri Papakonstantinou, Davide Mauri, Grigorios Kalliatakis, Manolis Tsiknakis, Domen Ribnikar, Dorothea Tsekoura, Valantis Aidarinis, Kalliopi Keramida, Panagiotis Oikonomopoulos, Athos Antoniades, Cameron Brown, Federica Rizzi, Anca Bucur, Elsa Pacella, Georgia Karanasiou, Daniela Cardinale, Carlo Cipolla, Elisabetta Munzone, Dimitrios Fotiadis, Giuseppe Curigliano, Gabriella Pravettoni

    Published 2025-08-01
    “…In total, 750 older patients with breast cancer (aged ≥60 years) are assigned to either the standard practice or enhanced monitoring group, with only patients in the latter receiving access to eHealth psychological, behavioral, and functional interventions implemented on the CARDIOCARE eHealtHeart app. …”
    Get full text
    Article
  15. 755

    Chromosome-Level Genome Assembly and Comparative Transcriptome Analyses Identified Energy Conservation as a Key Strategy for Anadromous Adaptation of the Hilsa Shad, <i>Tenualosa i... by Kishor Kumar Sarker, Liang Lu, Roland Nathan Mandal, Md Rashedur Rahman, Anirban Sarker, Mohammad Abdul Baki, Chenhong Li

    Published 2025-02-01
    “…Moreover, active gluconeogenesis and reduced insulin signaling in the liver are possibly linked to glucose homeostasis, potentially induced by prolonged starvation during migration. These genomic resources will accelerate the future evolutionary and functional genomics studies of <i>T. ilisha</i>.…”
    Get full text
    Article
  16. 756

    Comprehensive Evaluation of Chestnut Quality Based on Principal Component and Cluster Analysis by Yanqi YU, Mingyuan YANG, Chunmao LÜ, Shaoci BAI, Qunfang ZHANG, Chenyang ZOU, Han JIANG

    Published 2025-01-01
    “…To develop an appropriate method for evaluating the quality of chestnut resources. The 21 quality indicators of 25 chestnut varieties were detected and analyzed. …”
    Get full text
    Article
  17. 757

    Practical Implementation of a Smart Home Model Using Arduino and Sensors by Soufiane Hachani, Okba Benelmir

    Published 2025-05-01
    “…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
    Get full text
    Article
  18. 758
  19. 759
  20. 760