Showing 841 - 860 results of 937 for search '"explosive"', query time: 0.05s Refine Results
  1. 841

    Analysis of the Effect of Severe Accident Scenario on Debris Properties in Lower Plenum of Nordic BWR Using Different Versions of MELCOR Code by Sergey Galushin, Pavel Kudinov

    Published 2019-01-01
    “…Core melt is released into a deep pool of water where formation of noncoolable debris bed and ex-vessel steam explosion can pose credible threats to containment integrity. …”
    Get full text
    Article
  2. 842

    Location of Cynological Units in the Structure of the National Police of Ukraine and in the System of the Ministry of the Internal Affairs by V. V. Garmash

    Published 2019-09-01
    “…When introducing new developments, special attention should be paid to the contemporary challenges of the criminogenic situation (such as explosives, weapons, drugs).…”
    Get full text
    Article
  3. 843

    Visual Analysis of E-Commerce User Behavior Based on Log Mining by Tingzhong Wang, Nanjie Li, Hailong Wang, Junhong Xian, Jiayi Guo

    Published 2022-01-01
    “…With the continuous development of internet economy and e-commerce, the scale of data produced by users on e-commerce platform is increasing explosively. Mining the behavior of individual users and group users from massive user behavior data and analyzing the value and law behind the data are of great significance to the development of e-commerce. …”
    Get full text
    Article
  4. 844

    Ciudadanía y Sexualidades by Amy Lind, Sofía Argüello Pazmiño

    Published 2009-12-01
    “…Al mismo tiempo, ha habido una virtual explosión de los debates sobre la moral sexual que afectan a una amplia gama de cuestiones relacionadas con las instituciones sociales contemporáneas, tales como la familia, el Estado, la religión, la educación, la medicina, la psicología y la cultura popular. …”
    Get full text
    Article
  5. 845

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  6. 846

    Monitoring Volcanic Eruptions with Geographical Information Systems and Remote Sensing Methods: The Case Study of Cumbre Vieja Volcano (Spain) by Özer Akyürek

    Published 2022-07-01
    “…The Land surface temperature analysis, the temperature changes of the region before and after the explosion were examined. As a result of the GIS and UA analyzes, it was determined that various agricultural areas and forest areas, as well as residential areas and the ocean, were also damaged. …”
    Get full text
    Article
  7. 847

    Analysis of the Influence of Groundwater Level Fluctuation on Karst Soil Cave Collapse by Xuejun Chen, Mingming Xue, Yu Song

    Published 2023-01-01
    “…The higher the initial water level, the stronger the negative pressure absorption and positive pressure gas explosion effect on the overburden on the soil cave and the collapse will occur with fewer water level fluctuations. (4) The numerical simulation results are consistent with the laboratory model test. …”
    Get full text
    Article
  8. 848

    Deep Learning-Based English-Chinese Translation Research by Yao Huang, Yi Xin

    Published 2022-01-01
    “…The problems of gradient disappearance and gradient explosion are easy to occur in the recurrent neural network in the long-distance sequence. …”
    Get full text
    Article
  9. 849

    Multi-Objective Dynamic Path Planning with Multi-Agent Deep Reinforcement Learning by Mengxue Tao, Qiang Li, Junxi Yu

    Published 2024-12-01
    “…This model is suitable for complex, unstable task environments characterized by dimensionality explosion and offers scalability. The approach consists of two components: an action evaluation module and an action decision module, utilizing a centralized training with decentralized execution (CTDE) training architecture. …”
    Get full text
    Article
  10. 850

    Efficacy of SG Shield in reducing droplet contamination during collection of oropharyngeal swab culture specimens by Phui-Sze Angie Au-Yong, Xuanxuan Chen, Wen Hao Low, Keen Chong Chau, Stephanie Fook-Chong, Shariq Ali Khan

    Published 2022-09-01
    “…A small latex balloon containing ultraviolet fluorescent dye was placed in the oral cavity of the manikin and inflated until explosion to simulate a cough. Three study groups were tested: (a) control (no shield), (b) face shield and (c) SG Shield. …”
    Get full text
    Article
  11. 851

    Fire Hazards Caused by Equipment Used in Offshore Oil and Gas Operations: Prescriptive vs. Goal-Oriented Legislation by Dejan Brkić

    Published 2025-01-01
    “…Contrary to common belief, the most frequent types of accidents are not those involving a fire/explosion caused by the failure of the Blowout Preventer (BOP) after a well problem has already started. …”
    Get full text
    Article
  12. 852

    Instrumental intelligent platforms for criminal analysis by V. M. Strukov, Y. V. Gnusov, Y. V. Gnusov

    Published 2021-12-01
    “…Such features include: 1) "information explosion", which is intensifying, 2) accelerating the pace of development of modern technologies; 3) the cost of high-tech tools, which is rapidly declining, and such tools become available to ordinary citizens (including criminals). …”
    Get full text
    Article
  13. 853

    Penetrating liver injury caused by a metal fragment from a blast accident in a factory: a case report by Chan Hee Park, Jeong Woo Lee

    Published 2022-08-01
    “…On the day of the accident, there was a metal explosion, and multiple fragments of the metal lodged in the patient’s abdomen. …”
    Get full text
    Article
  14. 854

    Access to Essential Contraception, Family Planning, and Safe Motherhood Services During COVID-19 Pandemic: Single Secondary Level Care Hospital Experience by Jayanta Kumar Biswas, Soumen Das Poddar, Ganesh Saravagi, Ajith Nilakantan

    Published 2022-03-01
    “…Telemedicine can also play a supplementary role in various aspects of women’s health to avoid upcoming population explosion and for better maternal-child health care. …”
    Get full text
    Article
  15. 855
  16. 856

    Application of electric boilers for water apartment heat supply by A. L. Toropov

    Published 2023-09-01
    “…When using electricity tariffs for houses with electric stoves, the total cost of heat supply by electric boilers does not exceed the standards of payment for district heating of multi-storey buildings. Explosions and gas poisoning are excluded.Conclusions. …”
    Get full text
    Article
  17. 857
  18. 858

    Nebular and Nonthermal Radio Emissions for Young Stellar Populations with PARSEC v1.2s by Ikechukwu A. Obi, Pius N. Okeke, Bonaventure I. Okere

    Published 2025-01-01
    “…We account for the electron temperature dependence on IMF upper mass limit and metallicity while computing the thermal radio emission component, and also accounted for recent advances in core-collapse supernova explosion models while computing the nonthermal radio emission component. …”
    Get full text
    Article
  19. 859

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  20. 860

    Conceptual and Simulated Semi-Automatic Urban Waste Management System using Global Systems for Mobile Communication and Customer Reliability Indices by L. Ogunwolu, A.D. Omiyale, O.O.E. Ajibola

    Published 2019-08-01
    “…The challenges are fuelled by population explosions all over the world, especially in the major urban centres, against the backdrop of limited resources to manage wastes efficiently. …”
    Get full text
    Article