Showing 421 - 440 results of 937 for search '"explosives"', query time: 0.06s Refine Results
  1. 421

    Research progress and trend of text summarization by Tuosiyu MING, Hongchang CHEN

    Published 2018-06-01
    “…With the explosive growth of information on the Internet,how to extract useful information from massive information has become a key technical issue.The text summarization technology can compress and extract refined and concise document information from big data,effectively reducing the user information overload problem,and it has become a research hotspot.The domestic and foreign text summarization methods and their concrete realization in recent years were analyzed,the advantages and disadvantages between traditional methods and deep learning summary methods were compared,and a reasonable outlook for future research directions was made.…”
    Get full text
    Article
  2. 422

    Intelligent routing strategy in the Internet of things based on deep reinforcement learning by Ruijin DING, Feifei GAO, Ling XING

    Published 2019-06-01
    “…At the era of the Internet of things,networking mode that connects everything would bring tremendous increase in the data volume and challenge the traditional routing protocols.The limitations of the existing routing protocols was analyzed when facing the data explosion and then the routing selection problem was re-modeled as a Markov decision process.On this basis,the deep reinforcement learning technique was utilized to choose the next-hop router for data transmission task in order to shorten the transmission path length while network congestion was avoided.The simulation results demonstrate that the congestion probability can be reduced significantly and the network throughput can be enhanced by the proposed strategy.…”
    Get full text
    Article
  3. 423

    ANYTHING NEW UNDER THE SUN?! EXPLORING FURTHER AVENUES FOR WRITING ANOTHER COMMENTARY ON CHRONICLES by L C Jonker

    Published 2018-12-01
    “… Over the past two decades, there has been an explosion of new commentaries on Chronicles. Scholars may justifiably ask whether there is anything new under the sun to investigate in another commentary on this book. …”
    Get full text
    Article
  4. 424

    Component-Based Formal Modeling of PLC Systems by Rui Wang, Yong Guan, Luo Liming, Xiaojuan Li, Jie Zhang

    Published 2013-01-01
    “…At one hand, the model must be consistent with the system at the other hand, the model must have suitable scale because of the state explosion problem of verification. This paper proposes a systemic method for the construction of verification model. …”
    Get full text
    Article
  5. 425

    Research on technology mechanism used in P2P network video surveillance system by Xinyan FANG, Yanxia ZHANG, Ruilin CUI, Siwei LUO

    Published 2022-12-01
    “…At present, the scale of video monitoring of small and medium-sized enterprises and families in the civil market is growing explosively.In view of the monitoring demand of tens of millions of cameras, peer to peer (P2P) network video monitoring technology was widely used in the industry.The principle of P2P network video monitoring technology was expounded comprehensively, and the streaming media control technology, transmission technology and private network crossing technology adopted by the mainstream P2P network video monitoring were analyzed.Finally, a large-scale deployment of P2P video surveillance solution was proposed.…”
    Get full text
    Article
  6. 426

    Slot development using the controlled blasting in the ore body "Borska reka" by Vojinović Ivica, Svrkota Igor, Stojanović Miloš, Šabaz Dragan, Rajković Radmilo

    Published 2024-01-01
    “…Blasting the lower and upper parts of the slot created a free space of approximately 840 m³ with an approximate specific explosive consumption of 2.25 kg/m³…”
    Get full text
    Article
  7. 427

    Smart Internet of things aided by“terminal-edge-cloud” cooperation by Dapeng WU, Puning ZHANG, Ruyan WANG

    Published 2018-09-01
    “…The further expansion of the Internet of things (IoT) traffic and the explosive growth of the terminal data require higher delay performance and computing ability of the access network.The traditional wireless network architecture has been unable to support the rapid development of IoT.Thus,the edge-driven smart IoT architecture was proposed.Firstly,the main factors that restrict the development of IoT were analyzed,and then the edge computing technology was introduced into the IoT to form a “terminal-edge-cloud” cooperative computing architecture to deal with the traffic data efficiently and timely.Finally,the challenges of the edge-driven smart IoT were analyzed and the future work of this system was proposed.…”
    Get full text
    Article
  8. 428

    Research and application of broadband speed-up technology based on IPTV by Honggang ZHAO, Chunhui SONG, Dongsheng LIAN

    Published 2018-07-01
    “…With the increasing competition of broadband business homogenization and the explosive growth of IPTV users,differentiated products and service promotion are particularly important in the market competition.The development of IPTV industry and the technology of broadband speed-up technology was introduced,the core business process of broadband speed technology based on IPTV was expounded.Research results show that IPTV-based broadband speed-up technology can provide users with convenient and dynamic bandwidth adjustment services to meet the requirements of broadband bandwidth and IPTV users’ personalized bandwidth,the differentiation service advantage can be established,the risk of losing customers was reduced,the value of broadband and IPTV users is promoted.…”
    Get full text
    Article
  9. 429

    Malware classification method based on static multiple-feature fusion by Bo-wen SUN, Yan-yi HUANG, Qiao-kun WEN, Bin TIAN, Peng WU, Qi LI

    Published 2017-11-01
    “…In recent years,the amount of the malwares has tended to rise explosively.New malicious samples emerge as variability and polymorphism.By means of polymorphism,shelling and confusion,traditional ways of detecting can be avoided.On the basis of massive malicious samples,a safe and efficient method was designed to classify the mal-wares.Extracting three static features including file byte features,assembly features and PE features,as well as im-proving generalization of the model through feature fusion and ensemble learning,which realized the complementarity between the features and the classifier.The experiments show that the sample achieve a stable F1-socre (93.56%).…”
    Get full text
    Article
  10. 430
  11. 431

    Performance and key issues of 5G multi-channel joint transceiver technology by Yi PAN, Huihui LI, Lei ZENG, Weiwen CAI

    Published 2020-07-01
    “…With the explosive growth of data services,5G indoor coverage has become the top priority.Deploying 5G indoor subsystem is one of the important means to solve the problem of 5G indoor coverage.An upgrading scheme of 5G indoor subsystem based on multi-channel transceiver technology was introduced.This scheme can achieve double flow with single feeder and four flow with double feeder,and improve the performance of 5G with low cost.The main construction of the scheme includes:adding shaft cable,adding combiner,adding coupler,without changing the flat floor network structure.…”
    Get full text
    Article
  12. 432

    Optimization of Key Parameters for Coal Seam L-CO<sub>2</sub> Phase Transition Blasting Based on Response Surface Methodology by Xuanping Gong, Xiaoyu Cheng, Cheng Cheng, Quangui Li, Jizhao Xu, Yu Wang

    Published 2025-01-01
    “…This caused the aspect ratio of the external ellipse of the explosion fracture zone to range between 1.00 and 1.72. …”
    Get full text
    Article
  13. 433
  14. 434

    Investigation on the Vibration Effect of Shock Wave in Rock Burst by In Situ Microseismic Monitoring by Mingshi Gao, Hongchao Zhao, Yichao Zhao, Xiaojun Gao, Xiangyu Wang

    Published 2018-01-01
    “…Rock burst is a physical explosion associated with enormous damage at a short time. …”
    Get full text
    Article
  15. 435

    Behavior of unconfined steel-fiber reinforced UHPC post high-temperature exposure by Sohit Agrawal, Erika Yulianti, Mugahed Amran, Chung-Chan Hung

    Published 2025-07-01
    “…While many studies have focused on thermal effects such as explosive spalling and the compressive and flexural properties of UHPC, there is limited research on its residual uniaxial tensile behavior. …”
    Get full text
    Article
  16. 436

    SYMBOLIC EXECUTION IN AUTOMATICALLY GENERATIONOF DATA OF SOFTWARE TESTING by Tô Hữu Nguyên, Nguyễn Hồng Tân, Hà Thị Thanh, Đỗ Thanh Mai

    Published 2016-06-01
    “…This paper also shows different challenges that need setting in this field such as the explosion of execution paths in a program, the ability of constraint solving, memory modelling or concurrent problems etc. …”
    Get full text
    Article
  17. 437

    Adaptive Asymptotic Tracking Control for a Class of Uncertain Switched Systems via Dynamic Surface Technique by Xuemiao Chen, Qianjin Zhao, Chunsheng Zhang, Jian Wu

    Published 2019-01-01
    “…In addition, a dynamic surface control method is proposed by employing a nonlinear filter such that the “explosion of complexity” problem existing in the conventional backstepping design can be overcome. …”
    Get full text
    Article
  18. 438

    Derechos reproductivos y políticas demográficas en América Latina by Karina Felitti

    Published 2009-09-01
    “…Dichos debates incluían la explosión demográfica, la implementación de programas de desarrollo promocionados por organismos internacionales, la creciente movilización social y política de su población, y las transformaciones en la sexualidad y los roles de género. …”
    Get full text
    Article
  19. 439

    Vernuwing in die kerklied: die Liedboek van die Kerk (2001) by E. C. Kloppers

    Published 2003-06-01
    “… Renewal in hymnody and an “explosion” of hymns are taking place world-wide. Many new hymnals were published in the past decades. …”
    Get full text
    Article
  20. 440

    Optimization of task scheduling for computing reuse in computing power network by Yunxiao MA, Zhonghui WU, Zuyun XU, Lujie ZHONG, Changqiao XU

    Published 2023-11-01
    “…To cope with the challenges posed by the future explosive growth in computing power demand, computing reuse technology was introduced into the computing power network to reduce service latency and computational resource consumption by reusing the results of computational tasks.Based on this, a service federation-based context-aware online learning algorithm was proposed.First, the reuse index was designed to reduce the extra lookup latency.Then, online learning was performed based on the service federation mechanism to make computational task scheduling decisions according to contextual information and historical experience.The experimental results show that the proposed algorithm outperforms the baseline algorithms in terms of service latency and computational resource consumption.…”
    Get full text
    Article