Showing 621 - 640 results of 937 for search '"explosive"', query time: 0.05s Refine Results
  1. 621
  2. 622

    SYMBOLIC EXECUTION IN AUTOMATICALLY GENERATIONOF DATA OF SOFTWARE TESTING by Tô Hữu Nguyên, Nguyễn Hồng Tân, Hà Thị Thanh, Đỗ Thanh Mai

    Published 2016-06-01
    “…This paper also shows different challenges that need setting in this field such as the explosion of execution paths in a program, the ability of constraint solving, memory modelling or concurrent problems etc. …”
    Get full text
    Article
  3. 623

    Adaptive Asymptotic Tracking Control for a Class of Uncertain Switched Systems via Dynamic Surface Technique by Xuemiao Chen, Qianjin Zhao, Chunsheng Zhang, Jian Wu

    Published 2019-01-01
    “…In addition, a dynamic surface control method is proposed by employing a nonlinear filter such that the “explosion of complexity” problem existing in the conventional backstepping design can be overcome. …”
    Get full text
    Article
  4. 624

    Derechos reproductivos y políticas demográficas en América Latina by Karina Felitti

    Published 2009-09-01
    “…Dichos debates incluían la explosión demográfica, la implementación de programas de desarrollo promocionados por organismos internacionales, la creciente movilización social y política de su población, y las transformaciones en la sexualidad y los roles de género. …”
    Get full text
    Article
  5. 625

    Vernuwing in die kerklied: die Liedboek van die Kerk (2001) by E. C. Kloppers

    Published 2003-06-01
    “… Renewal in hymnody and an “explosion” of hymns are taking place world-wide. Many new hymnals were published in the past decades. …”
    Get full text
    Article
  6. 626

    Malware prediction technique based on program gene by Da XIAO, Bohan LIU, Baojiang CUI, Xiaochen WANG, Suoxing ZHANG

    Published 2018-08-01
    “…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
    Get full text
    Article
  7. 627

    One year of treating patients with open fractures of the lower extremity in a new military trauma center in Korea: a case series by Ji Wool Ko, Giho Moon, Jin Geun Kwon, Kyoung Eun Kim, Hankaram Jeon, Kyungwon Lee

    Published 2023-12-01
    “…Injury mechanisms included gunshot wounds, landmine explosions, grenade explosions, and entrapment by ship mooring ropes. …”
    Get full text
    Article
  8. 628

    Research on wireless monitoring system for internal temperature field of coal gangue mountain by Xiaofei Liu, Chunhao Liang, Jifa Qian, Xiaolin Li, Xuemei Li, Baoli Li, Guang Xu, Bin Zhou

    Published 2025-02-01
    “…In the long-term accumulation process, coal gangue can lead to severe consequences such as spontaneous combustion and explosions due to external factors. Additionally, the coal gangue that ignites spontaneously significantly pollutes the land and groundwater, causing serious risks to the health and safety of individuals living and working in the vicinity. …”
    Get full text
    Article
  9. 629
  10. 630

    Brentano on Space by Leslie Kavanaugh

    Published 2008-06-01
    “…In Vienna at the end of the nineteenth century, a virtual explosion occured of thought, creativity and revolutionary energy. …”
    Get full text
    Article
  11. 631

    Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection by Brij B. Gupta, Akshat Gaurav, Varsha Arya, Shavi Bansal, Razaz Waheeb Attar, Ahmed Alhomoud, Konstantinos Psannis

    Published 2025-12-01
    “…The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. …”
    Get full text
    Article
  12. 632

    La valeur économique comme fait social : la preuve par les évaluations boursières by André Orléan

    Published 2015-12-01
    “…Following this conception, the driving force is not produced by the individuals but by the market as an autonomous force. The explosion of the CDS during the period 2001-2007 and the Internet Bubble are illustrations of this hypothesis. …”
    Get full text
    Article
  13. 633

    Federated learning based intelligent edge computing technique for video surveillance by Yu ZHAO, Jie YANG, Miao LIU, Jinlong SUN, Guan GUI

    Published 2020-10-01
    “…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
    Get full text
    Article
  14. 634

    Development trend and technological challenges of millimeter-wave wireless communication by Shiwen HE, Yongming HUANG, Haiming WANG, Wei HONG

    Published 2017-06-01
    “…Facing the bottleneck problem of the scarcity of the traditional spectrum resource and the demand of wireless business that increases explosively,millimeter-wave (mmWave) communication with rich available spectrum resources become a promising way for the next generation broadband wireless cellular communication.However,the features of the large propagation path loss and severe oxygen and water molecules absorb of mmWave bring great challenge to the mmWave communication technology research.After analyzing the propagation properties of mmWave communication,a comprehensive analysis and summary of the research progress and radio front end were given out.Challenges of mmWave communication were profoundly analyzed and the corresponding research direction was put forward.…”
    Get full text
    Article
  15. 635

    Distributed software monitoring and trustworthiness evaluation based on checkpoints by Zhen LI, Jun-feng TIAN, Zhuo CHANG, Xiao-xue MA

    Published 2016-03-01
    “…Traditional software trustworthiness evaluation based on checkpoints and the existing interaction association rules for distributed software were inapplicable to distributed software with complex interactions.According to this problem,an accompanying distributed software monitoring mechanism was used,and three types of checkpoints in nodes and interaction association rules were introduced for complex interaction scene.The trustworthiness of the node instance was evaluated based on checkpoint structure tree by dividing nodes into several modules,and then the trustworthiness of distributed soft-ware was evaluated based on nodes.The experimental results showed that the approaches could evaluate the trustworthiness of distributed software instance accurately with small monitoring cost,and could be suitable for infinitely long paths with no state explosion problem for trustworthiness evaluation of distributed software.…”
    Get full text
    Article
  16. 636

    Questioning the Moratorium on Synthetic Phenomenology by Krzanowski Roman

    Published 2024-12-01
    “…In a paper published in 2021, Thomas Metzinger proposed a global moratorium on development of synthetic phenomenology, with this beginning in 2021 and lasting until 2050, arguing that the development of conscious artifacts would bring about an explosion of human-like suffering on a global scale. …”
    Get full text
    Article
  17. 637

    Into the clinic: Talimogene laherparepvec (T-VEC), a first-in-class intratumoral oncolytic viral therapy by Ann W. Silk, Howard L. Kaufman, Hasan Rehman, Michael P. Kane

    Published 2016-09-01
    “…Limiting factors include the intratumoral route of administration, which is unfamiliar to medical oncologists, biosafety concerns related to the use of a live virus in the clinic, and the explosion of other therapeutic strategies now available for the treatment of advanced melanoma. …”
    Get full text
    Article
  18. 638

    Defects-Induced Hot Spots in TATB by Zhonghua Yan, Chuanchao Zhang, Hongwei Yan, Zhijie Li, Li Li, Ming Huang, Bisheng Tan, Xiaodong Yuan

    Published 2014-01-01
    “…The three-dimensional models of triaminotrinitrobenzene (TATB) explosives containing spherical pores, craters, and cracks are established, respectively. …”
    Get full text
    Article
  19. 639

    1917 : l’Italie en ébullition by Stéfanie Prezioso

    Published 2017-12-01
    “…1917 : le vent qui souffle de l’Est soulève les espoirs de la paix, d’une transformation sociale et politique du continent en guerre et même d’une « révolution mondiale ». L’explosion de février 1917 et ses suites auront un impact d’autant plus important que l’intégration des mondes ouvriers était incomplète avant la guerre. …”
    Get full text
    Article
  20. 640

    Gestes et formes esthétiques désobéissants. by Mathieu Corp

    Published 2024-04-01
    “…Initiated by an act of civil disobedience during October 2019, the estallido social chileno ("Chilean social explosion") quickly became a massive mobilization, interrupted in March 2020 by the measures restricting freedoms imposed by Sebastián Piñera's government to curb the Covid-19 pandemic. …”
    Get full text
    Article