-
341
L’impact des pesticides utilisés en lutte contre le criquet pèlerin (schistocerca gregaria Forskål, 1775) (orthoptera, acrididae) sur deux espèces de pimelia (coleoptera, tenebrion...
Published 2005-12-01“…We used traps tubes (interception for ground arthropods) some to account for the relative abundance of the insects. …”
Get full text
Article -
342
Reservoir connectivity in deep-water turbidite deposits over geological and production time scales: an integrated study of the Shwe field, Bay of Bengal
Published 2024-10-01“…From a geological perspective, the results indicate that: (1) multiple water intercepts at a single gas gradient imply the presence of a connected reservoir with non-producible perched waters; (2) compensational stacking leads to extensive overlaps between lobe element layers, enhancing lateral reservoir connectivity through a high net-to-gross ratio (avg. 82%; max. 100%) and multiple amalgamated sand-sand contacts; and (3) sand injectites act as conduits between vertically separated reservoirs, contributing to gas production. …”
Get full text
Article -
343
Goaf Gas Control Improvement by Optimizing the Adjacent Roadway Large-Diameter Boreholes
Published 2021-01-01“…The gas control process in the upper corner and gas interception in goaf by large-diameter boreholes was analyzed using the CFD model of the gas flow in goaf. …”
Get full text
Article -
344
A Review Study on the Main Sources of Porosity in Al-Si Cast Alloys
Published 2021-01-01“…Intermetallics precipitate in the form of intercepted platelets which restricts the flow of the molten metal, leading to formation of shrinkage cavities. …”
Get full text
Article -
345
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.…”
Get full text
Article -
346
Application of Image Recognition Algorithm Based on Partial Differential Equation and Wavelet Transform in the Intelligent Linkage System of Government Urban Public Management
Published 2021-01-01“…Due to the limitations of research ability and objective conditions, this article intercepts the “cross-section” of the big linkage mechanism in a certain street to demonstrate it and analyzes this “cross-section” more thoroughly. …”
Get full text
Article -
347
Entre ciel et terre. Histoire de l’aéronautique militaire et archéologie : l’exemple d’Hazebrouck
Published 2018-08-01“…The excavation, however, revealed the remains of a German aircraft, a Messerschmitt Bf 109 G-6 fighter, still containing the body of the pilot who, thanks to the plate bearing his registration number, was identified as the Sergeant Horst Seemann, shot down on 4 September 1943, a year earlier, during an interception flight during an allied raid on the Hazebrouck railway marshalling yard. …”
Get full text
Article -
348
Impacts of Auroral Precipitation on HF Propagation: A Hypothetical Over‐the‐Horizon Radar Case Study
Published 2021-12-01“…Aurora were seen to increase maximum usable frequency from 8.5 to 26 MHz whilst also reducing median available range from 2,541 to 1,226 km and changing coverage area by −50.4% to 58.6%, for the greatest differences. Target interception showed large variations in path coverage of between 33%–115% and 0%–107% for two flight paths tested with precipitation toggled. …”
Get full text
Article -
349
Influence of Test Protocol on Filtration Efficiency of Medical Face Mask Material
Published 2023-11-01“…For particle sizes > 3 µm, the results indicated that the nature of the aerosol has little influence because particle collection is dominated by impaction and interception mechanisms. The tests with MS2 virus demonstrated a good fit with NaCl filtration efficiency expressed in aerodynamic diameters over a range between 0.65 and > 7 µm, for charged and discharged medical face mask materials.…”
Get full text
Article -
350
Generation and verification method of trusted signature seal incorporating handwriting features
Published 2024-02-01“…With the rapid development of electronic communication and internet technology, the digitization of document circulation and processing has become increasingly prevalent.The trend towards greater convenience, flexibility, and diversity in electronic document signing is evident through practices such as online signature collection, remote signature confirmation, and electronic signature authentication.However, the signing and verification processes face challenges related to authenticity, integrity, and more.Instances of unlawful entities intercepting, copying, and forging signature images using low-cost methods to sign documents with false identities, as well as tampering with and forging signature files, are common.The application of electronic signature systems also encounters obstacles such as high costs, limited deployment, lack of universality, and complexities in real-time and consistent verification.To address these risks and challenges and ensure reliable verification in personal document signing processes, a credible method for generating and verifying signature seals that integrate handwriting features was proposed.This method primarily utilized the facial recognition and identity information matching functions of a trusted identity authentication platform.It integrated signature handwriting features and uniquely bound them to the signer's identity for reliable authentication.Accordingly, a signature seal with integrated handwriting features, a verification link for the signed document, and a digital signature QR code were generated.Analysis indicates that the signature seal produced by the proposed method not only serves the purpose of identity verification but also enables the discernment of the authenticity of the signed document.The verification link embedded in the QR code can directly validate the signer's identity, handwriting, and the authenticity and consistency of the signed document through online channels, providing a convenient means for the verification of both electronic and paper documents.The proposed method holds broad application prospects in the fields of electronic document circulation and the verification of the authenticity of electronic and paper documents.…”
Get full text
Article -
351
Extensions to Mean–Geometric Mean Linking
Published 2024-12-01“…Additionally, a simulation study demonstrates that defining MGM linking based on item intercepts rather than item difficulties leads to more accurate linking parameter estimates. …”
Get full text
Article -
352
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
Get full text
Article -
353
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. …”
Get full text
Article -
354
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…However, in non-cooperative communication scenarios, detecting DSSS signals, estimating DSSS signal parameters, and even intercepting information are all issues that need to be considered. …”
Get full text
Article -
355
Comparison of growth, relative abundance, and diet of three sympatric Hemiandrus ground wētā (Orthoptera, Anostostomatidae) in a New Zealand Forest
Published 2025-01-01“…We identified the species and sex of 966 Hemiandrus wētā that were intercepted by the same malaise traps. Our results showed that H. electra was the most abundant species, with 701 individuals, while 157 and 109 were identified as H. …”
Get full text
Article -
356
Exploring novel and potent glycogen synthase kinase-3β inhibitors through systematic drug designing approach
Published 2025-02-01“…Therefore, inhibiting GSK-3β activity through active-site fitting molecules may offer a favourable strategy for intercepting these disorders. This comprehensive study used multiple assays in tandem in order to explore the most potent GSK-3β inhibitor. …”
Get full text
Article -
357
Revising Transient-Pressure Solution for Vertical Well Intersected by a Partially Penetrating Fracture with Non-Darcy Flow Effect
Published 2020-01-01“…The principle purpose of this work is to formulate an accurate mathematical model to evaluate the transient pressure behavior of a well intercepted by a partially penetrating vertical fracture (PPVF) with non-Darcy flow effect. …”
Get full text
Article -
358
Modern air defense methods and countermeasures for use in operational-tactical missiles
Published 2024-06-01“…Defense strategies span from fighter aircraft interception utilizing long-range missiles like the AIM-54C Phoenix to the deployment of surface-to-air missile systems such as the Tor-M1. …”
Get full text
Article -
359
Performance Assessment of a Permeable Reactive Barrier on Reducing Groundwater Transport of Nitrate from an Onsite Wastewater Treatment System
Published 2025-01-01“…The implemented PRB directly influences the sampling results from a monitoring well, but it is not necessarily confirmed that it intercepts the entire groundwater flow or fully prevents aquifer contamination. …”
Get full text
Article -
360
The problem of the oil-contaminated geo-environment and ways to solve it
Published 2024-08-01“…At the same time, the contamination “trapped” in the pores and capillaries of the soil was transferred to a free state, followed by outflow into the drainage, interception of the contaminated liquid and its rise to the surface for subsequent cleaning.Conclusions. …”
Get full text
Article