Showing 461 - 480 results of 937 for search '"explosives"', query time: 0.05s Refine Results
  1. 461

    March 8, 2019: A snapshot of new participants in the feminist mobilisation by Maite Aurrekoetxea-Casaus

    Published 2025-01-01
    “…This article’s contribution is thus essential to understand the current establishment and explosion of feminist activism and the ideological overtones of new participants in feminist activism. …”
    Get full text
    Article
  2. 462

    Application of big data and cloud computing in power industry by Ruchu LI, Minglong SHEN, Haitang PENG

    Published 2018-04-01
    “…With the rapid development of information technology,the amount of information among all walks of life has shown an explosive growth trend.China’s power industry also entered the era of big data immediately.Simultaneously,in view of the wide range of management involved in China’s power industry and the total amount of power data’s rapidly expanding,management and data server was put forward,big data technology and cloud computing technology have been widely used by virtue of its own advantages in the power industry.Therefore,based on elaborating on big data and cloud computing,the application of big data and cloud computing in power industry was analyzed systematically and the scope of application of big data and cloud computing in electric power industry in the future was further expanded.…”
    Get full text
    Article
  3. 463

    Apoptosis Gene Hunting Using Retroviral Expression Cloning: Identification of Vacuolar ATPase Subunit E by Claire L. Anderson, Gwyn T. Williams

    Published 2003-01-01
    “…Over the past 10-15 years there has been an explosion of interest in apoptosis. The delayed realisation that cell death is an essential part of life for any multicellular organism has meant that, despite the recent and rapid developments of the last decade, the precise biochemical pathways involved in apoptosis remain incomplete and potentially novel genes may, as yet, remain undiscovered. …”
    Get full text
    Article
  4. 464

    Low-power internet of underwater things: vision and key technologies by Yang LIU, Cuican LI, Mugen PENG

    Published 2022-06-01
    “…With the explosion of underwater sensing devices and the pursuit of energy conservation, the concept of low-power internet of underwater things has been put forward.Inspired by RF-based backscatter networks, the low-power internet of underwater things architecture uses underwater acoustic backscatter technology to realize the low-power and low-cost communication of underwater sensor nodes, which has a wide application prospect in underwater fields such as the long-term underwater detection.Firstly, the principle and architecture of low-power internet of underwater things was introduced.Then, the key technologies faced by the architecture were proposed and analyzed, such as perception, communication, networking, resource allocation, security and so on.Finally, the future research directions of low-power internet of underwater things were discussed.…”
    Get full text
    Article
  5. 465

    Possible Correlations between Strength and Leg Stability in Adolescents by P.F. Trofin, A.V. Rusu, A.E. Murariu, A.M.M. Nistor

    Published 2024-07-01
    “…Handgrip strength and explosive leg strength were measure. Stability was determined using the Y-Balance test. …”
    Get full text
    Article
  6. 466

    Particle Collision Near 1 + 1-Dimensional Horava-Lifshitz Black Hole and Naked Singularity by M. Halilsoy, A. Ovgun

    Published 2017-01-01
    “…The source of outgoing particles may be attributed to an explosive process just outside the horizon for a black hole and the naturally repulsive character for the case of a naked singularity. …”
    Get full text
    Article
  7. 467

    From the Guest Editors by Alberto d’Onofrio, Paola Cerrai, Alberto Gandolfi

    Published 2012-11-01
    “…This makes thestudyof tumors remarkably complicated. A genuine explosion of data concerning themulti-faceted aspects of this family of phenomena collectively called cancers,is now becoming available. …”
    Get full text
    Article
  8. 468

    An Analysis of Discrete Stage-Structured Prey and Prey-Predator Population Models by Arild Wikan

    Published 2017-01-01
    “…., the population will neither go extinct nor exhibit explosive oscillations) and, moreover, that the transfer from stability to nonstationary behaviour always goes through a supercritical Neimark−Sacker bifurcation. …”
    Get full text
    Article
  9. 469

    Research on intelligent computing offloading model based on reputation value in mobile edge computing by Jin QI, Hairong SUN, Kun GONG, Bin XU, Shunyi ZHANG, Yanfei SUN

    Published 2020-07-01
    “…Aiming at the problem of high-latency,high-energy-consumption,and low-reliability mobile caused by computing-intensive and delay-sensitive emerging mobile applications in the explosive growth of IoT smart mobile terminals in the mobile edge computing environment,an offload decision-making model where delay and energy consumption were comprehensively included,and a computing resource game allocation model based on reputation that took into account was proposed,then improved particle swarm algorithm and the method of Lagrange multipliers were used respectively to solve models.Simulation results show that the proposed method can meet the service requirements of emerging intelligent applications for low latency,low energy consumption and high reliability,and effectively implement the overall optimized allocation of computing offload resources.…”
    Get full text
    Article
  10. 470

    Dynamic Knowledge Network Modeling Orient to Intelligent Search by Jian Liu, Hongbo Xu, Yantao Jia, Xueqi Cheng

    Published 2014-10-01
    “…With the explosive growth of internet data and the increasing user demand, the traditional search methods has been difficult to meet user's needs in the mobile search field. …”
    Get full text
    Article
  11. 471

    Prescribed Performance Neural Control of Strict-Feedback Systems via Disturbance Observers by Wei Xiang, Guangkui Xu, Fang Zhu, Chunzhi Yang

    Published 2020-01-01
    “…And radial basis function neural networks (RBFNNs) are used to approximate nonlinear functions, while second-order filters are employed to eliminate the “explosion-complexity” problem inherent in the existing method. …”
    Get full text
    Article
  12. 472

    Leveraging Non-Parametric Reasoning With Large Language Models for Enhanced Knowledge Graph Completion by Ying Zhang, Yangpeng Shen, Gang Xiao, Jinghui Peng

    Published 2024-01-01
    “…However, existing knowledge graph completion methods face challenges such as difficulty in adapting to new entity information, parameter explosion, and limited generalization capability. To address these issues, this paper proposes a knowledge graph completion framework that integrates large language models with case-based reasoning (CBR-LLM). …”
    Get full text
    Article
  13. 473

    Research Progress on Corrosion of Equipment and Materials in Deep-Sea Environment by Sheng Chen, Liping Qiu, Shaofang Sun, Junyi Yang, Qinghua Meng, Weibo Yang

    Published 2021-01-01
    “…Owing to the particularity of pressure (15–120 MPa), hydrothermal temperature (90–400°C), and explosive fluid (strong H2S) in the deep-sea hydrothermal field environment, the research on the corrosion mechanism of service materials in this environment under the coupling action of many harsh factors is almost blank. …”
    Get full text
    Article
  14. 474

    Robust Adaptive Dynamic Surface Control for a Class of Nonlinear Dynamical Systems with Unknown Hysteresis by Yong-Hua Liu, Ying Feng, Xinkai Chen

    Published 2014-01-01
    “…By combining robust control and dynamic surface control technique, an adaptive controller is proposed in this paper to avoid “the explosion complexity” in the standard backstepping design procedure. …”
    Get full text
    Article
  15. 475

    Security protocol code analysis method combining model learning and symbolic execution by Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN

    Published 2021-10-01
    “…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
    Get full text
    Article
  16. 476

    Performance of 256QAM in LTE-Hi indoor scenario by Shan LIU, Cheng TAO, Liu LIU

    Published 2016-01-01
    “…In order to solve the traffic explosion of indoor and hotspots,LTE-Hi was put forward by 3GPP organization in Release12.Due to the coverage particularity of indoor and hotspots scenarios,the organization introduced 256QAM to improve system performance.According to the 256QAM constellation given in the standard,a soft demodulation algorithm based on border distance decision was deduced.Through a simulation of the UE SINR distribution in the LTE-Hi scenario,the feasibility of the 256QAM was proved and according to the CQI/MCS/TBS signaling table changed for 256QAM,link level simulation showed the 256QAM and 64QAM throughput in comparison under different EVM index.Finally,the system performance with and without the introduction of 256QAM under different scenarios was evaluated.…”
    Get full text
    Article
  17. 477

    Adaptive fuzzy command filtered control for uncertain fractional order nonlinear systems with full state constraints by Ruixia Liu, Yang Han, Lei Xing, Liyang Sun

    Published 2025-02-01
    “…Additionally, a FO command filter is implemented to approximate the virtual control signals and their derivatives, effectively addressing the explosion of complexity problem, while an error compensation function is incorporated to compensate for the filtering errors. …”
    Get full text
    Article
  18. 478

    Des athlètes trans aux Jeux olympiques ? Histoire d’une panique de genre dans la presse française (1935-2022) by Félix Pavlenko, Karl Ponthieux Stern

    Published 2024-04-01
    “…The results demonstrate the presence of a gender panic, periodized in four key periods: 1) the beginnings of a gender panic (1935-2002), 2) amplification of an essentialist perspective (2003-2015), 3) gendered differentiation of the contemporary gender panic (2015-2020), 4) media explosion since the Tokyo Games (2021-2022). This research thus contributes to understanding the role of cissexism in maintaining the gendered order within Olympism.…”
    Get full text
    Article
  19. 479

    Reconstruction of Reinforced Concrete Structures on The Example of Bridge Spans Damaged as a Result of Dynamic Impacts by Oleg A. Simakov

    Published 2023-07-01
    “…The problem of restoring reinforced concrete structures that have received dynamic impacts (emergency as a result of collisions with vehicles, damage as a result of dismantling nearby structures, explosive impacts) is quite an urgent issue. The current regulatory documents regarding the restoration and reinforcement of reinforced concrete structures do not fully correspond to the issues related to the results of dynamic impacts that have characteristic features. …”
    Get full text
    Article
  20. 480

    Numerical Study on Crack Propagation by Using Softening Model under Blasting by Rong Hu, Zheming Zhu, Jun Xie, Dingjun Xiao

    Published 2015-01-01
    “…The linear equation of state (EOS) was used for rock, and the JWL EOS was applied to the explosive. In order to validate the numerical simulation results, experiments by using PMMA (polymethyl methacrylate) with a crack and a borehole were carried out. …”
    Get full text
    Article