Showing 661 - 680 results of 937 for search '"explosive"', query time: 0.06s Refine Results
  1. 661

    Simulation and experimental study on energy absorption components of advanced hydraulic support for mining by Xiaochun XIAO, Ziyang LI, Xin DING, Jun XU, Heng ZHU, Zhen DING

    Published 2024-12-01
    “…The application of aluminum foam filled multi-cell square tube reduces the risk of cylinder explosion of the support column and improves the impact resistance of the column.…”
    Get full text
    Article
  2. 662

    Geological history plants dominated the net accumulation of coal by Yanqiang SHI, Yakun SHI

    Published 2024-12-01
    “…Confined by the vegetation during the coal accumulation period, the clasts in the basin can only move periodically in a limited space, forming a long clastic depletion period and a short clastic explosion period. During the debris depletion period, the sea / lake beach is fully flattened, the basement environment is “abandoned”, the water body is clear, the vegetation is dense, and the peat marshes are widely distributed. …”
    Get full text
    Article
  3. 663

    Helicobacter pylori: Genomic Insight into the Host-Pathogen Interaction by Kathryn P. Haley, Jennifer A. Gaddy

    Published 2015-01-01
    “…Infectious disease research in particular has experienced an explosion of bacterial genomic, transcriptomic, and proteomic data complementing the phenotypic methods employed in traditional bacteriology. …”
    Get full text
    Article
  4. 664

    A Drinking Problem: French Psychiatric Fears about the Increase in Muslim Alcoholics in Colonial Algeria by Nina Salouâ Studer

    Published 2022-09-01
    “…They voiced fears of an explosion in numbers of psychiatric patients due to this increase in alcoholism and a corresponding increase in crimes committed by intoxicated Muslim men. …”
    Get full text
    Article
  5. 665

    Log Pattern Mining for Distributed System Maintenance by Jia Chen, Peng Wang, Shiqing Du, Wei Wang

    Published 2020-01-01
    “…To solve the well-known problem of pattern explosion, we resort to the minimum description length (MDL) principle and take a step forward in summarizing the temporal relationships between adjacent events of a pattern. …”
    Get full text
    Article
  6. 666

    Simulation of Supersonic Flow in an Ejector Diffuser Using the JPVM by Carlos Couder-Castañeda

    Published 2009-01-01
    “…The ejectors are used commonly to extract gases in the petroleum industry where it is not possible to use an electric bomb due the explosion risk because the gases are flammable. The steam ejector is important in creating and holding a vacuum system. …”
    Get full text
    Article
  7. 667

    Presencia del pez fraile Salaria fluviatilis (Asso, 1801) en la cuenca hidrográfica del río Segura by Alfonso Sola Galindo, José Enrique Larios López Larios López, Jesús Díez Castro, Fernando Alonso Gutiérrez, Teresa Perales López, Mikel Zaragüeta Amondarain, Jorge San Juan Escuder, Carlos Rodríguez de Tapia, Julio Miguel Luzón Ortega

    Published 2024-10-01
    “…Un año después, la especie mostró una notable explosión poblacional y expansión geográfica, alcanzando densidades considerables en otras localidades del río Mundo, así como en el propio eje del río Segura y sus afluentes Benízar y Argos. …”
    Get full text
    Article
  8. 668

    Музыка в романе Евгения Водолазкина Брисбен by Tatiana Kopac

    Published 2023-06-01
    “…Fragments with musical ecphrasis have a vivid narrative, emotionally saturated (“moments of explosion”). The main emotional codes (or affects) find expression in the selection of musical compositions that assert the dramatic direction of the narrative. …”
    Get full text
    Article
  9. 669

    Synthesis and Characteristics of 1,2,4,5-Tetrazines for Using as High Energy Density Materials (HEDMs) by Sebastian Górecki, Agnieszka Kudelko

    Published 2025-01-01
    “…This review presents methods for constructing 1,2,4,5-tetrazine precursors from acyclic reagents and describes their chemical modifications, leading to new energetic compounds with potential applications in the industry as explosives, propellants, or pyrotechnics. Synthetic procedures and reaction conditions are discussed, along with the detonation parameters of new nitrogen-rich tetrazine-based products, which allow estimation of their application potential.…”
    Get full text
    Article
  10. 670

    Experimental analysis of the state of stress in a steel – titanium perforated plate loaded with concentrated force by Mateusz Konieczny, Grzegorz Gasiak, Henryk Achtelik

    Published 2020-12-01
    “…The paper presents an experimental analysis of the state of stress, free supported on the edge of a steel – titanium circular perforated plate loaded with a centrally concentrated force, created in the technological process of explosion welding. For this purpose, a special test stand was designed and a methodology for testing the perforated plate was developed. …”
    Get full text
    Article
  11. 671

    Smart breeding driven by advances in sequencing technology by Chenji Zhang, Sirong Jiang, Yangyang Tian, Xiaorui Dong, Jianjia Xiao, Yanjie Lu, Tiyun Liang, Hongmei Zhou, Dabin Xu, Han Zhang, Ming Luo, Zhiqiang Xia

    Published 2023-03-01
    “…Systematic analysis of the mainstream genotyping approaches based on principle, application scenario and supporting software revealed that the changes in genotyping technology have led to an explosion in data. This data expansion will drive a breakthrough in sequencing technology and integrate artificial intelligence with automation. …”
    Get full text
    Article
  12. 672

    Policy conflict detection in software defined network by using deep learning by Chuanhuang LI, Cheng CHENG, Xiaoyong YUAN, Lijie CEN, Weiming WANG

    Published 2017-11-01
    “…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
    Get full text
    Article
  13. 673

    Hyperspectral Image Classification Based on Attentional Residual Networks by Ning Wang, Xin Pan, Xiaoling Luo, Xiaojing Gao

    Published 2025-01-01
    “…Firstly, the residual network is used to extract the features of hyperspectral images, and the quality of feature extraction is effectively improved by solving the problem of gradient disappearance and gradient explosion in deep neural network training. Then, the Attention Module (AM) is introduced to optimize the feature extraction process, so that the model can focus on the important regions in the image. …”
    Get full text
    Article
  14. 674

    De l’or noir à l’or vert : le gaz de mine, une ressource de transition dans le Nord-Pas-de-Calais ? by Antoine Fontaine, Laurence Rocher

    Published 2023-06-01
    “…The emissions of this gas, which do not stop when mining activities cease, generate risks of explosion and significant atmospheric pollution. In the Nord-Pas-de-Calais coalfield, mine gas, an emblematic legacy of the coal mining past, is now seen as an energy resource and a vector for the renewal of the region. …”
    Get full text
    Article
  15. 675

    The Effect of Microwave Radiation on Prickly Paddy Melon (Cucumis myriocarpus) by Graham Brodie, Carmel Ryan, Carmel Lancaster

    Published 2012-01-01
    “…Stem rupture due to internal steam explosions often occurred after the first few seconds of microwave treatment when a small aperture antenna was used to apply the microwave energy. …”
    Get full text
    Article
  16. 676

    A New Method for E-Government Procurement Using Collaborative Filtering and Bayesian Approach by Shuai Zhang, Chengyu Xi, Yan Wang, Wenyu Zhang, Yanhong Chen

    Published 2013-01-01
    “…Therefore, government procurement sectors have to face challenges brought by the explosion of service information. This paper presents a novel method for E-government procurement (eGP) to search for the optimal procurement scheme (OPS). …”
    Get full text
    Article
  17. 677

    Command Filtering and Barrier Lyapunov Function-Based Adaptive Control for PMSMs with Core Losses and All-State Restrictions by Xiaoling Wang, Jinpeng Yu

    Published 2021-01-01
    “…Meanwhile, an advanced adaptive command filter control methodology is constructed to avoid the computing explosion during the process of backstepping design. …”
    Get full text
    Article
  18. 678

    Data security challenges and countermeasures in financial technology by Jianming ZHU, Hongrui YANG

    Published 2019-08-01
    “…While financial technology brings opportunities to the financial industry,it also brings new challenges.With the rapid development of financial technology,the big data explosion caused by the digitalization,networking and intelligence of financial services has put forward new and greater requirements for data security governance.Based on the analysis of the status quo of financial technology development and financial data security,a financial data security “shell” model for the characteristics of financial data was proposed:the internal is the security goals of ensuring data confidentiality,integrity,and availability; the external is a variety of threats including data leaking,tampering and destroying etc; the middle is various coping strategies,including access strategies,prevention and control strategies,detection strategies,perceived strategies and etc.According to this model,relevant suggestions and countermeasures for data security governance in financial technology are proposed.…”
    Get full text
    Article
  19. 679

    Green city: An efficient task joint execution strategy for mobile micro-learning by Li Yang, Ruijuan Zheng, Junlong Zhu, Mingchuan Zhang, Ruoshui Liu, Qingtao Wu

    Published 2018-06-01
    “…However, due to the explosively increased applications of the mobile micro-learning and the limited resources of mobile terminals, an effective energy saving approach for mobile micro-learning is urgently required. …”
    Get full text
    Article
  20. 680

    Prescribed Performance Tracking Control for the Hypersonic Vehicle with Actuator Faults by Zhenghui Yang, Wentao He, Yushan He, Yaen Xie, Jun Li, Shuo Song

    Published 2021-01-01
    “…The introduction of first-order low-pass filters effectively remedies the problem of “complexity explosion” existing in high-order backstepping design. …”
    Get full text
    Article