-
621
Asymmetries and Circumstellar Interaction in the Type II SN 2024bch
Published 2025-01-01“…Optical spectra from 2.8 days after the estimated explosion reveal narrow lines of H i , He ii , C iv , and N iv that disappear by day 6. …”
Get full text
Article -
622
SYMBOLIC EXECUTION IN AUTOMATICALLY GENERATIONOF DATA OF SOFTWARE TESTING
Published 2016-06-01“…This paper also shows different challenges that need setting in this field such as the explosion of execution paths in a program, the ability of constraint solving, memory modelling or concurrent problems etc. …”
Get full text
Article -
623
Adaptive Asymptotic Tracking Control for a Class of Uncertain Switched Systems via Dynamic Surface Technique
Published 2019-01-01“…In addition, a dynamic surface control method is proposed by employing a nonlinear filter such that the “explosion of complexity” problem existing in the conventional backstepping design can be overcome. …”
Get full text
Article -
624
Derechos reproductivos y políticas demográficas en América Latina
Published 2009-09-01“…Dichos debates incluían la explosión demográfica, la implementación de programas de desarrollo promocionados por organismos internacionales, la creciente movilización social y política de su población, y las transformaciones en la sexualidad y los roles de género. …”
Get full text
Article -
625
Vernuwing in die kerklied: die Liedboek van die Kerk (2001)
Published 2003-06-01“… Renewal in hymnody and an “explosion” of hymns are taking place world-wide. Many new hymnals were published in the past decades. …”
Get full text
Article -
626
Malware prediction technique based on program gene
Published 2018-08-01“…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
Get full text
Article -
627
One year of treating patients with open fractures of the lower extremity in a new military trauma center in Korea: a case series
Published 2023-12-01“…Injury mechanisms included gunshot wounds, landmine explosions, grenade explosions, and entrapment by ship mooring ropes. …”
Get full text
Article -
628
Research on wireless monitoring system for internal temperature field of coal gangue mountain
Published 2025-02-01“…In the long-term accumulation process, coal gangue can lead to severe consequences such as spontaneous combustion and explosions due to external factors. Additionally, the coal gangue that ignites spontaneously significantly pollutes the land and groundwater, causing serious risks to the health and safety of individuals living and working in the vicinity. …”
Get full text
Article -
629
-
630
Brentano on Space
Published 2008-06-01“…In Vienna at the end of the nineteenth century, a virtual explosion occured of thought, creativity and revolutionary energy. …”
Get full text
Article -
631
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Published 2025-12-01“…The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. …”
Get full text
Article -
632
La valeur économique comme fait social : la preuve par les évaluations boursières
Published 2015-12-01“…Following this conception, the driving force is not produced by the individuals but by the market as an autonomous force. The explosion of the CDS during the period 2001-2007 and the Internet Bubble are illustrations of this hypothesis. …”
Get full text
Article -
633
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
634
Development trend and technological challenges of millimeter-wave wireless communication
Published 2017-06-01“…Facing the bottleneck problem of the scarcity of the traditional spectrum resource and the demand of wireless business that increases explosively,millimeter-wave (mmWave) communication with rich available spectrum resources become a promising way for the next generation broadband wireless cellular communication.However,the features of the large propagation path loss and severe oxygen and water molecules absorb of mmWave bring great challenge to the mmWave communication technology research.After analyzing the propagation properties of mmWave communication,a comprehensive analysis and summary of the research progress and radio front end were given out.Challenges of mmWave communication were profoundly analyzed and the corresponding research direction was put forward.…”
Get full text
Article -
635
Distributed software monitoring and trustworthiness evaluation based on checkpoints
Published 2016-03-01“…Traditional software trustworthiness evaluation based on checkpoints and the existing interaction association rules for distributed software were inapplicable to distributed software with complex interactions.According to this problem,an accompanying distributed software monitoring mechanism was used,and three types of checkpoints in nodes and interaction association rules were introduced for complex interaction scene.The trustworthiness of the node instance was evaluated based on checkpoint structure tree by dividing nodes into several modules,and then the trustworthiness of distributed soft-ware was evaluated based on nodes.The experimental results showed that the approaches could evaluate the trustworthiness of distributed software instance accurately with small monitoring cost,and could be suitable for infinitely long paths with no state explosion problem for trustworthiness evaluation of distributed software.…”
Get full text
Article -
636
Questioning the Moratorium on Synthetic Phenomenology
Published 2024-12-01“…In a paper published in 2021, Thomas Metzinger proposed a global moratorium on development of synthetic phenomenology, with this beginning in 2021 and lasting until 2050, arguing that the development of conscious artifacts would bring about an explosion of human-like suffering on a global scale. …”
Get full text
Article -
637
Into the clinic: Talimogene laherparepvec (T-VEC), a first-in-class intratumoral oncolytic viral therapy
Published 2016-09-01“…Limiting factors include the intratumoral route of administration, which is unfamiliar to medical oncologists, biosafety concerns related to the use of a live virus in the clinic, and the explosion of other therapeutic strategies now available for the treatment of advanced melanoma. …”
Get full text
Article -
638
Defects-Induced Hot Spots in TATB
Published 2014-01-01“…The three-dimensional models of triaminotrinitrobenzene (TATB) explosives containing spherical pores, craters, and cracks are established, respectively. …”
Get full text
Article -
639
1917 : l’Italie en ébullition
Published 2017-12-01“…1917 : le vent qui souffle de l’Est soulève les espoirs de la paix, d’une transformation sociale et politique du continent en guerre et même d’une « révolution mondiale ». L’explosion de février 1917 et ses suites auront un impact d’autant plus important que l’intégration des mondes ouvriers était incomplète avant la guerre. …”
Get full text
Article -
640
Gestes et formes esthétiques désobéissants.
Published 2024-04-01“…Initiated by an act of civil disobedience during October 2019, the estallido social chileno ("Chilean social explosion") quickly became a massive mobilization, interrupted in March 2020 by the measures restricting freedoms imposed by Sebastián Piñera's government to curb the Covid-19 pandemic. …”
Get full text
Article