-
661
Simulation and experimental study on energy absorption components of advanced hydraulic support for mining
Published 2024-12-01“…The application of aluminum foam filled multi-cell square tube reduces the risk of cylinder explosion of the support column and improves the impact resistance of the column.…”
Get full text
Article -
662
Geological history plants dominated the net accumulation of coal
Published 2024-12-01“…Confined by the vegetation during the coal accumulation period, the clasts in the basin can only move periodically in a limited space, forming a long clastic depletion period and a short clastic explosion period. During the debris depletion period, the sea / lake beach is fully flattened, the basement environment is “abandoned”, the water body is clear, the vegetation is dense, and the peat marshes are widely distributed. …”
Get full text
Article -
663
Helicobacter pylori: Genomic Insight into the Host-Pathogen Interaction
Published 2015-01-01“…Infectious disease research in particular has experienced an explosion of bacterial genomic, transcriptomic, and proteomic data complementing the phenotypic methods employed in traditional bacteriology. …”
Get full text
Article -
664
A Drinking Problem: French Psychiatric Fears about the Increase in Muslim Alcoholics in Colonial Algeria
Published 2022-09-01“…They voiced fears of an explosion in numbers of psychiatric patients due to this increase in alcoholism and a corresponding increase in crimes committed by intoxicated Muslim men. …”
Get full text
Article -
665
Log Pattern Mining for Distributed System Maintenance
Published 2020-01-01“…To solve the well-known problem of pattern explosion, we resort to the minimum description length (MDL) principle and take a step forward in summarizing the temporal relationships between adjacent events of a pattern. …”
Get full text
Article -
666
Simulation of Supersonic Flow in an Ejector Diffuser Using the JPVM
Published 2009-01-01“…The ejectors are used commonly to extract gases in the petroleum industry where it is not possible to use an electric bomb due the explosion risk because the gases are flammable. The steam ejector is important in creating and holding a vacuum system. …”
Get full text
Article -
667
Presencia del pez fraile Salaria fluviatilis (Asso, 1801) en la cuenca hidrográfica del río Segura
Published 2024-10-01“…Un año después, la especie mostró una notable explosión poblacional y expansión geográfica, alcanzando densidades considerables en otras localidades del río Mundo, así como en el propio eje del río Segura y sus afluentes Benízar y Argos. …”
Get full text
Article -
668
Музыка в романе Евгения Водолазкина Брисбен
Published 2023-06-01“…Fragments with musical ecphrasis have a vivid narrative, emotionally saturated (“moments of explosion”). The main emotional codes (or affects) find expression in the selection of musical compositions that assert the dramatic direction of the narrative. …”
Get full text
Article -
669
Synthesis and Characteristics of 1,2,4,5-Tetrazines for Using as High Energy Density Materials (HEDMs)
Published 2025-01-01“…This review presents methods for constructing 1,2,4,5-tetrazine precursors from acyclic reagents and describes their chemical modifications, leading to new energetic compounds with potential applications in the industry as explosives, propellants, or pyrotechnics. Synthetic procedures and reaction conditions are discussed, along with the detonation parameters of new nitrogen-rich tetrazine-based products, which allow estimation of their application potential.…”
Get full text
Article -
670
Experimental analysis of the state of stress in a steel – titanium perforated plate loaded with concentrated force
Published 2020-12-01“…The paper presents an experimental analysis of the state of stress, free supported on the edge of a steel – titanium circular perforated plate loaded with a centrally concentrated force, created in the technological process of explosion welding. For this purpose, a special test stand was designed and a methodology for testing the perforated plate was developed. …”
Get full text
Article -
671
Smart breeding driven by advances in sequencing technology
Published 2023-03-01“…Systematic analysis of the mainstream genotyping approaches based on principle, application scenario and supporting software revealed that the changes in genotyping technology have led to an explosion in data. This data expansion will drive a breakthrough in sequencing technology and integrate artificial intelligence with automation. …”
Get full text
Article -
672
Policy conflict detection in software defined network by using deep learning
Published 2017-11-01“…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
Get full text
Article -
673
Hyperspectral Image Classification Based on Attentional Residual Networks
Published 2025-01-01“…Firstly, the residual network is used to extract the features of hyperspectral images, and the quality of feature extraction is effectively improved by solving the problem of gradient disappearance and gradient explosion in deep neural network training. Then, the Attention Module (AM) is introduced to optimize the feature extraction process, so that the model can focus on the important regions in the image. …”
Get full text
Article -
674
De l’or noir à l’or vert : le gaz de mine, une ressource de transition dans le Nord-Pas-de-Calais ?
Published 2023-06-01“…The emissions of this gas, which do not stop when mining activities cease, generate risks of explosion and significant atmospheric pollution. In the Nord-Pas-de-Calais coalfield, mine gas, an emblematic legacy of the coal mining past, is now seen as an energy resource and a vector for the renewal of the region. …”
Get full text
Article -
675
The Effect of Microwave Radiation on Prickly Paddy Melon (Cucumis myriocarpus)
Published 2012-01-01“…Stem rupture due to internal steam explosions often occurred after the first few seconds of microwave treatment when a small aperture antenna was used to apply the microwave energy. …”
Get full text
Article -
676
A New Method for E-Government Procurement Using Collaborative Filtering and Bayesian Approach
Published 2013-01-01“…Therefore, government procurement sectors have to face challenges brought by the explosion of service information. This paper presents a novel method for E-government procurement (eGP) to search for the optimal procurement scheme (OPS). …”
Get full text
Article -
677
Command Filtering and Barrier Lyapunov Function-Based Adaptive Control for PMSMs with Core Losses and All-State Restrictions
Published 2021-01-01“…Meanwhile, an advanced adaptive command filter control methodology is constructed to avoid the computing explosion during the process of backstepping design. …”
Get full text
Article -
678
Data security challenges and countermeasures in financial technology
Published 2019-08-01“…While financial technology brings opportunities to the financial industry,it also brings new challenges.With the rapid development of financial technology,the big data explosion caused by the digitalization,networking and intelligence of financial services has put forward new and greater requirements for data security governance.Based on the analysis of the status quo of financial technology development and financial data security,a financial data security “shell” model for the characteristics of financial data was proposed:the internal is the security goals of ensuring data confidentiality,integrity,and availability; the external is a variety of threats including data leaking,tampering and destroying etc; the middle is various coping strategies,including access strategies,prevention and control strategies,detection strategies,perceived strategies and etc.According to this model,relevant suggestions and countermeasures for data security governance in financial technology are proposed.…”
Get full text
Article -
679
Green city: An efficient task joint execution strategy for mobile micro-learning
Published 2018-06-01“…However, due to the explosively increased applications of the mobile micro-learning and the limited resources of mobile terminals, an effective energy saving approach for mobile micro-learning is urgently required. …”
Get full text
Article -
680
Prescribed Performance Tracking Control for the Hypersonic Vehicle with Actuator Faults
Published 2021-01-01“…The introduction of first-order low-pass filters effectively remedies the problem of “complexity explosion” existing in high-order backstepping design. …”
Get full text
Article