-
841
Analysis of the Effect of Severe Accident Scenario on Debris Properties in Lower Plenum of Nordic BWR Using Different Versions of MELCOR Code
Published 2019-01-01“…Core melt is released into a deep pool of water where formation of noncoolable debris bed and ex-vessel steam explosion can pose credible threats to containment integrity. …”
Get full text
Article -
842
Location of Cynological Units in the Structure of the National Police of Ukraine and in the System of the Ministry of the Internal Affairs
Published 2019-09-01“…When introducing new developments, special attention should be paid to the contemporary challenges of the criminogenic situation (such as explosives, weapons, drugs).…”
Get full text
Article -
843
Visual Analysis of E-Commerce User Behavior Based on Log Mining
Published 2022-01-01“…With the continuous development of internet economy and e-commerce, the scale of data produced by users on e-commerce platform is increasing explosively. Mining the behavior of individual users and group users from massive user behavior data and analyzing the value and law behind the data are of great significance to the development of e-commerce. …”
Get full text
Article -
844
Ciudadanía y Sexualidades
Published 2009-12-01“…Al mismo tiempo, ha habido una virtual explosión de los debates sobre la moral sexual que afectan a una amplia gama de cuestiones relacionadas con las instituciones sociales contemporáneas, tales como la familia, el Estado, la religión, la educación, la medicina, la psicología y la cultura popular. …”
Get full text
Article -
845
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
846
Monitoring Volcanic Eruptions with Geographical Information Systems and Remote Sensing Methods: The Case Study of Cumbre Vieja Volcano (Spain)
Published 2022-07-01“…The Land surface temperature analysis, the temperature changes of the region before and after the explosion were examined. As a result of the GIS and UA analyzes, it was determined that various agricultural areas and forest areas, as well as residential areas and the ocean, were also damaged. …”
Get full text
Article -
847
Analysis of the Influence of Groundwater Level Fluctuation on Karst Soil Cave Collapse
Published 2023-01-01“…The higher the initial water level, the stronger the negative pressure absorption and positive pressure gas explosion effect on the overburden on the soil cave and the collapse will occur with fewer water level fluctuations. (4) The numerical simulation results are consistent with the laboratory model test. …”
Get full text
Article -
848
Deep Learning-Based English-Chinese Translation Research
Published 2022-01-01“…The problems of gradient disappearance and gradient explosion are easy to occur in the recurrent neural network in the long-distance sequence. …”
Get full text
Article -
849
Multi-Objective Dynamic Path Planning with Multi-Agent Deep Reinforcement Learning
Published 2024-12-01“…This model is suitable for complex, unstable task environments characterized by dimensionality explosion and offers scalability. The approach consists of two components: an action evaluation module and an action decision module, utilizing a centralized training with decentralized execution (CTDE) training architecture. …”
Get full text
Article -
850
Efficacy of SG Shield in reducing droplet contamination during collection of oropharyngeal swab culture specimens
Published 2022-09-01“…A small latex balloon containing ultraviolet fluorescent dye was placed in the oral cavity of the manikin and inflated until explosion to simulate a cough. Three study groups were tested: (a) control (no shield), (b) face shield and (c) SG Shield. …”
Get full text
Article -
851
Fire Hazards Caused by Equipment Used in Offshore Oil and Gas Operations: Prescriptive vs. Goal-Oriented Legislation
Published 2025-01-01“…Contrary to common belief, the most frequent types of accidents are not those involving a fire/explosion caused by the failure of the Blowout Preventer (BOP) after a well problem has already started. …”
Get full text
Article -
852
Instrumental intelligent platforms for criminal analysis
Published 2021-12-01“…Such features include: 1) "information explosion", which is intensifying, 2) accelerating the pace of development of modern technologies; 3) the cost of high-tech tools, which is rapidly declining, and such tools become available to ordinary citizens (including criminals). …”
Get full text
Article -
853
Penetrating liver injury caused by a metal fragment from a blast accident in a factory: a case report
Published 2022-08-01“…On the day of the accident, there was a metal explosion, and multiple fragments of the metal lodged in the patient’s abdomen. …”
Get full text
Article -
854
Access to Essential Contraception, Family Planning, and Safe Motherhood Services During COVID-19 Pandemic: Single Secondary Level Care Hospital Experience
Published 2022-03-01“…Telemedicine can also play a supplementary role in various aspects of women’s health to avoid upcoming population explosion and for better maternal-child health care. …”
Get full text
Article -
855
-
856
Application of electric boilers for water apartment heat supply
Published 2023-09-01“…When using electricity tariffs for houses with electric stoves, the total cost of heat supply by electric boilers does not exceed the standards of payment for district heating of multi-storey buildings. Explosions and gas poisoning are excluded.Conclusions. …”
Get full text
Article -
857
Joint Investigation and 3D Visual Evaluation of Rock Mass Quality
Published 2020-01-01Get full text
Article -
858
Nebular and Nonthermal Radio Emissions for Young Stellar Populations with PARSEC v1.2s
Published 2025-01-01“…We account for the electron temperature dependence on IMF upper mass limit and metallicity while computing the thermal radio emission component, and also accounted for recent advances in core-collapse supernova explosion models while computing the nonthermal radio emission component. …”
Get full text
Article -
859
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
860
Conceptual and Simulated Semi-Automatic Urban Waste Management System using Global Systems for Mobile Communication and Customer Reliability Indices
Published 2019-08-01“…The challenges are fuelled by population explosions all over the world, especially in the major urban centres, against the backdrop of limited resources to manage wastes efficiently. …”
Get full text
Article