-
441
High-Energy Blast Injury Requiring Transradial Amputation with Associated Essex Lopresti and Terrible Triad Injuries of the Elbow: A Rare Presentation
Published 2021-01-01“…We describe a case of a high-energy blast injury to an upper extremity from an explosive. The transfer of energy caused severe soft tissue/bony damage to the hand, but also led to associated Essex Lopresti and terrible triad injuries. …”
Get full text
Article -
442
Malware prediction technique based on program gene
Published 2018-08-01“…With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of malicious sources.To resolve this status,the definition of program gene was raised,a generic method of extracting program gene was designed,and a malicious program prediction method was proposed based on program gene.Utilizing machine learning and deep-learning algorithms,the forecasting system has good prediction ability,with the accuracy rate of 99.3% in the deep-learning model,which validates the role of program gene theory in the field of malicious program analysis.…”
Get full text
Article -
443
One year of treating patients with open fractures of the lower extremity in a new military trauma center in Korea: a case series
Published 2023-12-01“…Injury mechanisms included gunshot wounds, landmine explosions, grenade explosions, and entrapment by ship mooring ropes. …”
Get full text
Article -
444
Using Radiogenic Noble Gas Nuclides to Identify and Characterize Rock Fracturing
Published 2025-01-01“…Fracture‐released radiogenic 4He is used to constrain the volume of newly created fractures with a model of helium release from fracturing. Explosive by‐product gas was observed in multiple locations both near and distal to the shot locations for both detonations. …”
Get full text
Article -
445
A Bibliometric Analysis of Medullary Thyroid Carcinoma From 2000 to 2022
Published 2024-07-01“…The keywords emerging explosively in recent years were management, survival, guideline, association, etc. …”
Get full text
Article -
446
Brentano on Space
Published 2008-06-01“…In Vienna at the end of the nineteenth century, a virtual explosion occured of thought, creativity and revolutionary energy. …”
Get full text
Article -
447
High Time for a Gas Price Cap: An Important Instrument in the Fight Against Energy Price Burdens
Published 2022-09-01“…Abstract The explosive increase of the price of natural gas is a key driver of inflation in Germany. …”
Get full text
Article -
448
Calculation Model and Decoupling Coefficient Sensitivity Study of Periphery Hole for Eccentric Decoupled Charge in Highway Tunnels
Published 2018-01-01“…Besides, based on the proposed calculation model, blasting effect of a small-diameter EJ-102 emulsion explosive is calculated by using ANSYS LS-DYNA. The influence of decoupling coefficient, different rock grade, and different RQD value on blasting effect is obtained by sensitivity analysis of the simulated parameters. …”
Get full text
Article -
449
Nanocell:an Aggregation Solution of TD-LTE and WLAN
Published 2013-05-01“…The rapid development of mobile internet and explosive growth of wireless data traffic especially for indoor scenarios,bring forward various challenges to mobile network operators. …”
Get full text
Article -
450
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Published 2025-12-01“…The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. …”
Get full text
Article -
451
La valeur économique comme fait social : la preuve par les évaluations boursières
Published 2015-12-01“…Following this conception, the driving force is not produced by the individuals but by the market as an autonomous force. The explosion of the CDS during the period 2001-2007 and the Internet Bubble are illustrations of this hypothesis. …”
Get full text
Article -
452
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
453
Development trend and technological challenges of millimeter-wave wireless communication
Published 2017-06-01“…Facing the bottleneck problem of the scarcity of the traditional spectrum resource and the demand of wireless business that increases explosively,millimeter-wave (mmWave) communication with rich available spectrum resources become a promising way for the next generation broadband wireless cellular communication.However,the features of the large propagation path loss and severe oxygen and water molecules absorb of mmWave bring great challenge to the mmWave communication technology research.After analyzing the propagation properties of mmWave communication,a comprehensive analysis and summary of the research progress and radio front end were given out.Challenges of mmWave communication were profoundly analyzed and the corresponding research direction was put forward.…”
Get full text
Article -
454
Distributed software monitoring and trustworthiness evaluation based on checkpoints
Published 2016-03-01“…Traditional software trustworthiness evaluation based on checkpoints and the existing interaction association rules for distributed software were inapplicable to distributed software with complex interactions.According to this problem,an accompanying distributed software monitoring mechanism was used,and three types of checkpoints in nodes and interaction association rules were introduced for complex interaction scene.The trustworthiness of the node instance was evaluated based on checkpoint structure tree by dividing nodes into several modules,and then the trustworthiness of distributed soft-ware was evaluated based on nodes.The experimental results showed that the approaches could evaluate the trustworthiness of distributed software instance accurately with small monitoring cost,and could be suitable for infinitely long paths with no state explosion problem for trustworthiness evaluation of distributed software.…”
Get full text
Article -
455
Questioning the Moratorium on Synthetic Phenomenology
Published 2024-12-01“…In a paper published in 2021, Thomas Metzinger proposed a global moratorium on development of synthetic phenomenology, with this beginning in 2021 and lasting until 2050, arguing that the development of conscious artifacts would bring about an explosion of human-like suffering on a global scale. …”
Get full text
Article -
456
Fiber optic control system for geotechnical parameters of mine
Published 2021-03-01“…The developed quasi-distributed fiber-optic system is capable of measuring with high accuracy changes in rock pressure and displacement of roof rocks in an explosive environment, also does not require expensive equipment associated with the use of a range of analyzers and reflectometers. …”
Get full text
Article -
457
Into the clinic: Talimogene laherparepvec (T-VEC), a first-in-class intratumoral oncolytic viral therapy
Published 2016-09-01“…Limiting factors include the intratumoral route of administration, which is unfamiliar to medical oncologists, biosafety concerns related to the use of a live virus in the clinic, and the explosion of other therapeutic strategies now available for the treatment of advanced melanoma. …”
Get full text
Article -
458
Tapping into Florida's Craft Beer Market: A Brewer's Guide to Consumer Purchasing and Consumption Habits in the Sunshine State
Published 2025-01-01“… Florida’s craft beer industry has undergone explosive growth in the past decade, expanding sixfold from just 66 to 396 breweries, with an estimated economic impact of over $4 billion dollars in 2022. …”
Get full text
Article -
459
1917 : l’Italie en ébullition
Published 2017-12-01“…1917 : le vent qui souffle de l’Est soulève les espoirs de la paix, d’une transformation sociale et politique du continent en guerre et même d’une « révolution mondiale ». L’explosion de février 1917 et ses suites auront un impact d’autant plus important que l’intégration des mondes ouvriers était incomplète avant la guerre. …”
Get full text
Article -
460
Gestes et formes esthétiques désobéissants.
Published 2024-04-01“…Initiated by an act of civil disobedience during October 2019, the estallido social chileno ("Chilean social explosion") quickly became a massive mobilization, interrupted in March 2020 by the measures restricting freedoms imposed by Sebastián Piñera's government to curb the Covid-19 pandemic. …”
Get full text
Article