Showing 521 - 540 results of 937 for search '"explosives"', query time: 0.05s Refine Results
  1. 521

    Data security challenges and countermeasures in financial technology by Jianming ZHU, Hongrui YANG

    Published 2019-08-01
    “…While financial technology brings opportunities to the financial industry,it also brings new challenges.With the rapid development of financial technology,the big data explosion caused by the digitalization,networking and intelligence of financial services has put forward new and greater requirements for data security governance.Based on the analysis of the status quo of financial technology development and financial data security,a financial data security “shell” model for the characteristics of financial data was proposed:the internal is the security goals of ensuring data confidentiality,integrity,and availability; the external is a variety of threats including data leaking,tampering and destroying etc; the middle is various coping strategies,including access strategies,prevention and control strategies,detection strategies,perceived strategies and etc.According to this model,relevant suggestions and countermeasures for data security governance in financial technology are proposed.…”
    Get full text
    Article
  2. 522

    Response Modelling of a Burnt Clay Brick Wall Subjected to Air Blast Loading. by Katusiime, Bridget

    Published 2023
    “…Although modelling debris is beyond the scope of this study, standoff distance between the explosive and the wall has been used as a safety parameter. …”
    Get full text
    Thesis
  3. 523

    Structural Response of Submerged Air-Backed Plates by Experimental and Numerical Analyses by Lloyd Hammond, Raphael Grzebieta

    Published 2000-01-01
    “…This paper presents the results of a series of small-scale underwater shock experiments that measured the structural responses of submerged, fully clamped, air-backed, steel plates to a range of high explosive charge sizes. The experimental results were subsequently used to validate a series of simulations using the coupled LS-DYNA/USA finite element/boundary element codes. …”
    Get full text
    Article
  4. 524

    Green city: An efficient task joint execution strategy for mobile micro-learning by Li Yang, Ruijuan Zheng, Junlong Zhu, Mingchuan Zhang, Ruoshui Liu, Qingtao Wu

    Published 2018-06-01
    “…However, due to the explosively increased applications of the mobile micro-learning and the limited resources of mobile terminals, an effective energy saving approach for mobile micro-learning is urgently required. …”
    Get full text
    Article
  5. 525

    Modelling the Diffusion of Investment Decisions on Modular Social Networks by Xiaokang Cheng, Narisa Zhao

    Published 2020-01-01
    “…The results show that both modularity and the clustering coefficient have an impact on the diffusion velocity and scale and that the impact is most evident at the stage of explosive growth. The negative influence of a large modularity can be hardly mitigated by adjusting other factors. …”
    Get full text
    Article
  6. 526

    Review of Slice Resource Management Technology in Space-Integrated-Ground Access Network by Ning HUI, Qian SUN, Yuanyuan WANG, Zongshuai ZHANG, Lin TIAN, Jing ZHANG, Xiao WEI

    Published 2022-12-01
    “…With the explosive growth of diff erentiated services, it is urgent to manage wireless spectrum and computing resources on demand dynamically in the sliced access network (RAN) of the space-integrated-ground network.Resulting from that, refi ned and guaranteed qualities of services are achieved.Thus, it is necessary to study the dynamic management of spectrum and computing resources in the sliced RAN of space-air-ground integrated networks.The resource management technologies in sliced RAN of the space-integrated-ground were discussed.The current research status of resource management in the space-integratedground access network was summarized.The future demands of resource management in sliced RAN of the space-integratedground system were analyzed, included the high isolation of wireless spectrum resource, the collaboration of computing resources among space and ground parts, and the real-time heterogeneous resource management in complex sliced RAN of space-air-ground integrated networks.The corresponding key technologies of the three demands were provided.…”
    Get full text
    Article
  7. 527

    Research on the directional fracturing mechanism of multiborehole rock mass plasma blasting by Xue LI, Chuanbing WANG, Yanbing WANG, Hongjia MEI, Yanqing LI, Zhaoyang WANG, Diancai XIAO

    Published 2025-02-01
    “…When the precut slot spacing is small, the shock waves from the electro-explosive events are closer together, overlapping to form a combined shock wave. …”
    Get full text
    Article
  8. 528

    Prescribed Performance Tracking Control for the Hypersonic Vehicle with Actuator Faults by Zhenghui Yang, Wentao He, Yushan He, Yaen Xie, Jun Li, Shuo Song

    Published 2021-01-01
    “…The introduction of first-order low-pass filters effectively remedies the problem of “complexity explosion” existing in high-order backstepping design. …”
    Get full text
    Article
  9. 529

    Perspectives of Integrative Cancer Genomics in Next Generation Sequencing Era by So Mee Kwon, Hyunwoo Cho, Ji Hye Choi, Byul A Jee, Yuna Jo, Hyun Goo Woo

    Published 2012-06-01
    “…The explosive development of genomics technologies including microarrays and next generation sequencing (NGS) has provided comprehensive maps of cancer genomes, including the expression of mRNAs and microRNAs, DNA copy numbers, sequence variations, and epigenetic changes. …”
    Get full text
    Article
  10. 530

    Numerical Simulations as Tool to Predict Chemical and Radiological Hazardous Diffusion in Case of Nonconventional Events by J.-F. Ciparisse, A. Malizia, L. A. Poggi, O. Cenciarelli, M. Gelfusa, M. C. Carestia, D. Di Giovanni, S. Mancinelli, L. Palombi, C. Bellecci, P. Gaudio

    Published 2016-01-01
    “…The aim of this paper is to show how CFD calculations can help to understand the time evolution of two possible CBRNe (Chemical-Biological-Radiological-Nuclear-explosive) events: (1) hazardous dust mobilization due to the interaction between a jet of air and a metallic powder in case of a LOVA (Loss Of Vacuum Accidents) that is one of the possible accidents that can occur in experimental nuclear fusion plants; (2) toxic gas release in atmosphere. …”
    Get full text
    Article
  11. 531

    Nutritional and Pharmacological Enhancement of the Gut-Associated Lymphoid Tissue by M Keith Hanna, Kenneth A Kudsk

    Published 2000-01-01
    “…There has been an explosion of research in the field of nutrition over the past quarter century. …”
    Get full text
    Article
  12. 532

    Vector control for the Chikungunya disease by Yves Dumont, Frederic Chiroleu

    Published 2010-03-01
    “…We previously proposed a compartmental model to explain the outbreak ofChikungunya disease in Réunion Island, a French territory in Indian Ocean,and other countries in 2005 and possible links with the explosive epidemicof 2006. In the present paper, we asked whether it would have been possibleto contain or stop the epidemic of 2006 through appropriate mosquito controltools. …”
    Get full text
    Article
  13. 533

    Formal modeling and security analysis method of security protocol based on CPN by Xiang GONG, Tao FENG, Jinze DU

    Published 2021-09-01
    “…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
    Get full text
    Article
  14. 534

    ALVIC versus the Internet: Redesigning a Networked Virtual Environment Architecture by Peter Quax, Jeroen Dierckx, Bart Cornelissen, Wim Lamotte

    Published 2008-01-01
    “…The explosive growth of the number of applications based on networked virtual environment technology, both games and virtual communities, shows that these types of applications have become commonplace in a short period of time. …”
    Get full text
    Article
  15. 535

    Safety and Reliability Analysis of Reconfigurable Battery Energy Storage System by Helin Xu, Lin Cheng, Daniyaer Paizulamu, Haoyu Zheng

    Published 2024-12-01
    “…Nevertheless, with the extensive utilization of LIBs, incidents of fires and explosions resulting from thermal runaway (TR) have become increasingly prevalent. …”
    Get full text
    Article
  16. 536

    A Scalable and Privacy-Aware Location-Sensing Model for Ephemeral Social Network Service by Yongqiang Lyu, Dezhi Hong, Ying Wang, Yinghong Hou, Zhengwen Yang, Yu Chen, Yuanchun Shi, Alvin Chin

    Published 2013-03-01
    “…Social network services (SNSs) are developing at an explosive speed, which makes it easy for people to be closely connected. …”
    Get full text
    Article
  17. 537

    Research on Parameter Optimization of the Express Warehousing and Distribution System Based on the Box–Behnken Response Surface Methodology by Nan Zhao, Maochun Wang

    Published 2021-01-01
    “…The goal is to find out the key factors affecting “customer satisfaction” and “warehouse explosion” and determine the optimal parameters to minimize the operation time and congestion rate of the system. …”
    Get full text
    Article
  18. 538

    Modelling the brittle failure of graphite induced by the controlled impact of runaway electrons in DIII-D by S. Ratynskaia, P. Tolias, T. Rizzi, K. Paschalidis, A. Kulachenko, E. Hollmann, M. Beidler, Y. Liu, D. Rudakov, I. Bykov, R.A. Pitts

    Published 2025-01-01
    “…Measurements of the conducted energy, damage topology, explosion timing and blown-off material volume, impose a number of empirical constraints that suffice to distinguish between different RE impact scenarios and to identify RE parameters which provide the best match to the observations.…”
    Get full text
    Article
  19. 539

    QoE-aware video cooperative caching and transmission mechanism based on TWDM-PON and C-RAN by Dapeng WU, Xue LI, Hongxia LI

    Published 2019-03-01
    “…The quality of user experience suffers from performance deterioration dramatically due to the explosively growing data traffic.To improve the poor performance of cell-edge users and heavy-load cell users,which caused by dense network and load imbalance respectively,an QoE-aware video cooperative caching and transmission mechanism in cloud radio access network was proposed.Cooperative gain-aware virtual passive optical network was established to provide cooperative caching and transmission for video streaming by adopting collaborative approach in optical domain and wireless domain.Furthermore,user experience for video streaming,bandwidth provisioning and caching strategy were jointly optimized to improve QoE,which utilized the methods of dynamic caching in optical domain and buffer level-aware bandwidth configuration in wireless domain.The results show that the proposed mechanism enhances the quality of user experience and effectively improves the cache hit rate.…”
    Get full text
    Article
  20. 540

    Research and implementation of multi-protocol association scheme on Uu interface in LTE-Advanced network by Lei LI, Zhizhong ZHANG, Bing XI

    Published 2016-06-01
    “…For the explosive growth of mobile data services in LTE-Advanced network and the low efficiency of multi-protocol association analysis process,on the basis of traditional signal monitoring system,a multi-protocol association analysis system of Uu interface in LTE-Advanced network was proposed by using big data technology (storage,processing and analysis)and multi-protocol association analysis technology.Firstly,Layer 1,Layer 2 and Layer 3 of Uu interface data business processes were processed efficiently and analyzed accurately.Then,the user data signaling process and service data flow were related to analyze.Finally,the proposed system was applied to the real network testing of Uu interface data in LTE-Advanced network.Test results show that the multi-protocol association analysis system described above achieves the expected effect and it is meaningful for improving user experiences,efficiently processing big data analytics and the promotion of precision marketing area.…”
    Get full text
    Article