Showing 901 - 920 results of 937 for search '"explosive"', query time: 0.06s Refine Results
  1. 901

    A wireless sensor network for coal mine safety powered by modified localization algorithm by Hafiz Zameer ul Hassan, Anyi Wang, Ghulam Mohi-ud-din

    Published 2025-01-01
    “…In coal mines, gas leaks pose a serious safety risk, often leading to explosions or toxic exposure. Temperature control is difficult due to fluctuating underground conditions, potentially causing heat stress or equipment malfunction. …”
    Get full text
    Article
  2. 902

    A novel hybrid cooling system for a Lithium-ion battery pack based on forced air and fins integrated with phase change material by Mohanad F. Hassan, Abdul Hadi N. Khalifa, Ahmed J. Hamad

    Published 2025-03-01
    “…However, they face challenges, including thermal runaway and safety risks from thermal damage to an explosion. Therefore, effective cooling methods and strong thermal management systems ensure their safety and optimal performance. …”
    Get full text
    Article
  3. 903

    Methods Used in Urban Search and Rescue in Disasters and Evaluation of Current Approaches by Gürkan Yılmaz, Sevda Demiröz Yıldırım

    Published 2020-01-01
    “…Disaster is an event that results in serious physical and death of large number of people, because of earthquake, tsunami, flood, landslide, volcano eruption, hurricane, hose, airplane accidents, train accidents, nuclear power plant accidents, explosions and terrorist attacks. Urban search and rescue works are important for finding people and animals trapped under the collapsed structure after the collapse of buildings as a result of earthquakes, terrorist attacks and landslides. …”
    Get full text
    Article
  4. 904

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  5. 905
  6. 906

    Criminal law protection of critical infrastructure objects against subversive encroachments by О. V. Shamsutdinov, D. S. Melnyk

    Published 2022-09-01
    “…On this basis, it has been proposed to formulate the second form of sabotage (Article 113 of the Criminal Code of Ukraine) in the following wording: “Destruction or damage to a critical infrastructure object by arson, explosion or other means with the aim of weakening the state”, as well as to supplement the Criminal Code of Ukraine with an amendment on sabotage, which is understood as “actions aimed at weakening the state, actions or decision-making aimed at destabilizing or making impossible the intended functioning of a critical infrastructure object, in the absence of signs of diversion”.…”
    Get full text
    Article
  7. 907

    Venezuela: Political Confrontation and the World Community by Z. W. Iwanowski, D. M. Rozental

    Published 2020-11-01
    “…In the worst-case scenario, a constantly worsening situation may result in a social explosion which threatens to make the Bolivarian Republic another hot spot of the planet.…”
    Get full text
    Article
  8. 908

    Les édifices néogothiques parisiens et leurs verrières : églises et chapelles catholiques by Martine Callias Bey

    Published 2012-04-01
    “…The iconography of these works reflects the evolution of France’s religious life during the period, from the liberty of the Concordat to the Congregationist explosion, the return of Papal authority, the anti-congregationist movement, and the law of separation of church and state in 1905. …”
    Get full text
    Article
  9. 909

    IMPLICATION OF COMMUNALISM IN CHILD-TRAINING IN ANCIENT ISRAEL AND TRADITIONAL YORUBA SETTING FOR MORAL EDUCATION IN CONTEMPORARY NIGERIA by FABAREBO SAMUEL IDOWU, IYANDA ABEL OLATOYE

    Published 2024-07-01
    “…Our civilization, ranging from population explosion, rapid technology advancement, knowledge expansion, industrialization, globalization, mobilization and influence of foreign cultures, is unconsciously conflicting with African moral principles that value human dignity, rights and responsibilities. …”
    Get full text
    Article
  10. 910

    Representing and Quantifying Conformational Changes of Kinases and Phosphatases Using the TSR-Based Algorithm by Tarikul I. Milon, Krishna Rauniyar, Sara Furman, Khairum H. Orthi, Yingchun Wang, Vijay Raghavan, Wu Xu

    Published 2024-11-01
    “…Protein kinases and phosphatases are key signaling proteins and are important drug targets. An explosion in the number of publicly available 3D structures of proteins has been seen in recent years. …”
    Get full text
    Article
  11. 911

    Continuous-flow columns packed with zero-valent iron and iron sulfide as a feasible strategy to remediate the persistent contaminant nitroguanidine by Youngjae Yu, Erika E. Rios-Valenciana, Robert A. Root, Reyes Sierra-Alvarez, Jon Chorover, Jim A. Field

    Published 2025-01-01
    “…Army to avoid unintended explosions. However, NQ also represents an emerging contaminant whose environmental emissions can cause toxicity toward aquatic organisms, indicating the need for effective remediation strategies. …”
    Get full text
    Article
  12. 912

    Few-shot Remote Sensing Imagery Recognition with Compositionality Inductive Bias in Hierarchical Representation Space by Shichao Zhou, Zhuowei Wang, Zekai Zhang, Wenzheng Wang, Yingrui Zhao, Yunpu Zhang

    Published 2025-01-01
    “…Remote sensing scenes from aerial perspective can be constructed by distinct visual parts in a combinatorial number of different ways. Such combinatorial explosion poses great challenges to understanding remote sensing imagery (RSI) with few prior instances (i.e., few-shot RSI recognition). …”
    Get full text
    Article
  13. 913

    Peculiarities of the special knowledge application in the investigation of taking a government official or law enforcement officer as hostage by O. Yu. Prokopenko

    Published 2023-12-01
    “…Taking a government official or law enforcement officer as a hostage is no exception; on the contrary, from the moment information about the seizure is received, there is a need to engage specialists from various fields of knowledge, including a forensic expert, dog handler, explosives expert, etc. The purpose of the study is to investigate the scientific findings on the definition of the concept of “special knowledge” and to clarify its role in the investigation of criminal proceedings under Article 349 “Taking a government official or law enforcement officer as a hostage” of the Criminal Code of Ukraine. …”
    Get full text
    Article
  14. 914

    Proceso de cuidado enfermero aplicado en un paciente con trastorno de pánico y ansiedad paroxística episódica by Karol Lizzette Pérez Rivas, Ana Cristina Arriaran Quispe, Alessandra Cárdenas Benites, Edy Luz Vergara Rojas, Rodolfo Amado Arévalo Marcos , Petronila Elizabeth Alvarado Chávez

    Published 2023-08-01
    “…Conclusión: El diagnóstico priorizado (00289), riesgo de conducta suicida, tuvo como puntuación de cambio con base en los indicadores de desinterés por la vida (+2), explosión de ira (+3) y dolor (+3). …”
    Get full text
    Article
  15. 915

    Neuromodulation of risk and reward processing during decision making in individuals with general anxiety disorder (GAD) by Vahid Nejati, Jamal Amani Rad, Amir Hosein Hadian Rasanan

    Published 2025-01-01
    “…Moreover, for anodal dlPFC (F3)/cathodal vmPFC (Fp2), anodal vmPFC (Fp2)/cathodal dlPFC (F3), and anodal vmPFC (Fp2)/cathodal left shoulder stimulations we have observed an improvement in prior beliefs about the explosion. Also, for anodal dlPFC (F3)/cathodal vmPFC (Fp2), anodal dlPFC (F3)/cathodal right shoulder, anodal vmPFC (Fp2)/cathodal left shoulder we have observed more stable choice pattern. the DDT, exponential discounting rate and randomness were improved during anodal dlPFC and anodal vmPFC stimulation with extracranial return electrodes. …”
    Get full text
    Article
  16. 916
  17. 917

    Searching for string bosenovas with gravitational wave detectors by Dawid Brzeminski, Anson Hook, Junwu Huang, Clayton Ristow

    Published 2025-01-01
    “…Abstract We study the phenomenology of a string bosenova explosion in vector superradiance clouds around spinning black holes, focusing on the observable consequences in gravitational wave detectors and accelerometers. …”
    Get full text
    Article
  18. 918

    Experts Participation in Crime Scene Search while Investigating Murders by A. H. Vuima

    Published 2021-07-01
    “…The specifics of the explosives specialist’s activity at the crime scene have been revealed, and the author has also determined the documents that are compiled by the latter based on the results of his participation in the crime scene search. …”
    Get full text
    Article
  19. 919

    The Ediacaran-Cambrian Radiation of Animals within the Villuercas-Ibores-Jara UNESCO Global Geopark, Spain by Iván Cortijo, Teodoro Palacios, Sören Jensen, José María Barrera

    Published 2021-06-01
    “…Within a few tens of millions of years into the Cambrian Period an array of animal groups appeared, some extinct and others ancestral to modern groups, the Cambrian “explosion”. Two key elements were the appearance of biomineralized hard parts and the rise of animal disturbance of the sea floor (bioturbation), which continued into the great Ordovician biodiversification event (GOBE). …”
    Get full text
    Article
  20. 920

    Prioritization of potato genes involved in the formation of agronomically valuable traits using the SOLANUM TUBEROSUM knowledge base by P. S. Demenkov, O. V. Saik, T. V. Ivanisenko, N. A. Kolchanov, A. V. Kochetov, V. A. Ivanisenko

    Published 2019-05-01
    “…The development of highly efficient technologies in genomics, transcriptomics, proteomics and metabolomics, as well as new technologies in agriculture has led to an “information explosion” in plant biology and crop production, including potato production. …”
    Get full text
    Article