Showing 341 - 360 results of 408 for search '"The Intercept"', query time: 0.06s Refine Results
  1. 341
  2. 342

    Reservoir connectivity in deep-water turbidite deposits over geological and production time scales: an integrated study of the Shwe field, Bay of Bengal by Han-Gwi Lim, Changwon Lee

    Published 2024-10-01
    “…From a geological perspective, the results indicate that: (1) multiple water intercepts at a single gas gradient imply the presence of a connected reservoir with non-producible perched waters; (2) compensational stacking leads to extensive overlaps between lobe element layers, enhancing lateral reservoir connectivity through a high net-to-gross ratio (avg. 82%; max. 100%) and multiple amalgamated sand-sand contacts; and (3) sand injectites act as conduits between vertically separated reservoirs, contributing to gas production. …”
    Get full text
    Article
  3. 343

    Goaf Gas Control Improvement by Optimizing the Adjacent Roadway Large-Diameter Boreholes by Wei Wang, Zongxiang Li, Hongming Yu

    Published 2021-01-01
    “…The gas control process in the upper corner and gas interception in goaf by large-diameter boreholes was analyzed using the CFD model of the gas flow in goaf. …”
    Get full text
    Article
  4. 344

    A Review Study on the Main Sources of Porosity in Al-Si Cast Alloys by Agnes Samuel, Yasser Zedan, Herbert Doty, Victor Songmene, Fawzy. H. Samuel

    Published 2021-01-01
    “…Intermetallics precipitate in the form of intercepted platelets which restricts the flow of the molten metal, leading to formation of shrinkage cavities. …”
    Get full text
    Article
  5. 345

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.…”
    Get full text
    Article
  6. 346

    Application of Image Recognition Algorithm Based on Partial Differential Equation and Wavelet Transform in the Intelligent Linkage System of Government Urban Public Management by Xinyu Xu

    Published 2021-01-01
    “…Due to the limitations of research ability and objective conditions, this article intercepts the “cross-section” of the big linkage mechanism in a certain street to demonstrate it and analyzes this “cross-section” more thoroughly. …”
    Get full text
    Article
  7. 347

    Entre ciel et terre. Histoire de l’aéronautique militaire et archéologie : l’exemple d’Hazebrouck by Yves Roumegoux

    Published 2018-08-01
    “…The excavation, however, revealed the remains of a German aircraft, a Messerschmitt Bf 109 G-6 fighter, still containing the body of the pilot who, thanks to the plate bearing his registration number, was identified as the Sergeant Horst Seemann, shot down on 4 September 1943, a year earlier, during an interception flight during an allied raid on the Hazebrouck railway marshalling yard. …”
    Get full text
    Article
  8. 348

    Impacts of Auroral Precipitation on HF Propagation: A Hypothetical Over‐the‐Horizon Radar Case Study by Joshua J. Ruck, David R. Themens

    Published 2021-12-01
    “…Aurora were seen to increase maximum usable frequency from 8.5 to 26 MHz whilst also reducing median available range from 2,541 to 1,226 km and changing coverage area by −50.4% to 58.6%, for the greatest differences. Target interception showed large variations in path coverage of between 33%–115% and 0%–107% for two flight paths tested with precipitation toggled. …”
    Get full text
    Article
  9. 349

    Influence of Test Protocol on Filtration Efficiency of Medical Face Mask Material by Aurélie Joubert, Ala Bouhanguel, Yves Andrès, Laurence Le Coq

    Published 2023-11-01
    “…For particle sizes > 3 µm, the results indicated that the nature of the aerosol has little influence because particle collection is dominated by impaction and interception mechanisms. The tests with MS2 virus demonstrated a good fit with NaCl filtration efficiency expressed in aerodynamic diameters over a range between 0.65 and > 7 µm, for charged and discharged medical face mask materials.…”
    Get full text
    Article
  10. 350

    Generation and verification method of trusted signature seal incorporating handwriting features by Li LI, Shang GAO, Peiliang ZUO, Jiazheng XUAN, Han SONG

    Published 2024-02-01
    “…With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic document signing is evident through practices such as online signature collection, remote signature confirmation, and electronic signature authentication.However, the signing and verification processes face challenges related to authenticity, integrity, and more.Instances of unlawful entities intercepting, copying, and forging signature images using low-cost methods to sign documents with false identities, as well as tampering with and forging signature files, are common.The application of electronic signature systems also encounters obstacles such as high costs, limited deployment, lack of universality, and complexities in real-time and consistent verification.To address these risks and challenges and ensure reliable verification in personal document signing processes, a credible method for generating and verifying signature seals that integrate handwriting features was proposed.This method primarily utilized the facial recognition and identity information matching functions of a trusted identity authentication platform.It integrated signature handwriting features and uniquely bound them to the signer's identity for reliable authentication.Accordingly, a signature seal with integrated handwriting features, a verification link for the signed document, and a digital signature QR code were generated.Analysis indicates that the signature seal produced by the proposed method not only serves the purpose of identity verification but also enables the discernment of the authenticity of the signed document.The verification link embedded in the QR code can directly validate the signer's identity, handwriting, and the authenticity and consistency of the signed document through online channels, providing a convenient means for the verification of both electronic and paper documents.The proposed method holds broad application prospects in the fields of electronic document circulation and the verification of the authenticity of electronic and paper documents.…”
    Get full text
    Article
  11. 351

    Extensions to Mean–Geometric Mean Linking by Alexander Robitzsch

    Published 2024-12-01
    “…Additionally, a simulation study demonstrates that defining MGM linking based on item intercepts rather than item difficulties leads to more accurate linking parameter estimates. …”
    Get full text
    Article
  12. 352

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article
  13. 353

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. …”
    Get full text
    Article
  14. 354

    Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting by LIANG Zhiru, BIAN Dongming, ZHANG Gengxin

    Published 2024-12-01
    “…However, in non-cooperative communication scenarios, detecting DSSS signals, estimating DSSS signal parameters, and even intercepting information are all issues that need to be considered. …”
    Get full text
    Article
  15. 355

    Comparison of growth, relative abundance, and diet of three sympatric Hemiandrus ground wētā (Orthoptera, Anostostomatidae) in a New Zealand Forest by Nyasha Chikwature, Mary Morgan-Richards, Jessica Vereijssen, Steven A. Trewick

    Published 2025-01-01
    “…We identified the species and sex of 966 Hemiandrus wētā that were intercepted by the same malaise traps. Our results showed that H. electra was the most abundant species, with 701 individuals, while 157 and 109 were identified as H. …”
    Get full text
    Article
  16. 356

    Exploring novel and potent glycogen synthase kinase-3β inhibitors through systematic drug designing approach by Shabir Ahmad Ganai, Suma Mohan, Shahid Ahmad Padder

    Published 2025-02-01
    “…Therefore, inhibiting GSK-3β activity through active-site fitting molecules may offer a favourable strategy for intercepting these disorders. This comprehensive study used multiple assays in tandem in order to explore the most potent GSK-3β inhibitor. …”
    Get full text
    Article
  17. 357

    Revising Transient-Pressure Solution for Vertical Well Intersected by a Partially Penetrating Fracture with Non-Darcy Flow Effect by Shuheng Cui, Jie Kong, Hongwei Yu, Cheng Chen, Junlei Wang

    Published 2020-01-01
    “…The principle purpose of this work is to formulate an accurate mathematical model to evaluate the transient pressure behavior of a well intercepted by a partially penetrating vertical fracture (PPVF) with non-Darcy flow effect. …”
    Get full text
    Article
  18. 358

    Modern air defense methods and countermeasures for use in operational-tactical missiles by Mykola Bondarenko, Mykhailo Vorobei

    Published 2024-06-01
    “…Defense strategies span from fighter aircraft interception utilizing long-range missiles like the AIM-54C Phoenix to the deployment of surface-to-air missile systems such as the Tor-M1. …”
    Get full text
    Article
  19. 359

    Performance Assessment of a Permeable Reactive Barrier on Reducing Groundwater Transport of Nitrate from an Onsite Wastewater Treatment System by Charles P. Humphrey Jr., Guy Iverson, Mike O’Driscoll

    Published 2025-01-01
    “…The implemented PRB directly influences the sampling results from a monitoring well, but it is not necessarily confirmed that it intercepts the entire groundwater flow or fully prevents aquifer contamination. …”
    Get full text
    Article
  20. 360

    The problem of the oil-contaminated geo-environment and ways to solve it by K. L. Chertes, V. N. Pystin, O. V. Tupitsyna, I. M. Evgrafova

    Published 2024-08-01
    “…At the same time, the contamination “trapped” in the pores and capillaries of the soil was transferred to a free state, followed by outflow into the drainage, interception of the contaminated liquid and its rise to the surface for subsequent cleaning.Conclusions. …”
    Get full text
    Article