Showing 601 - 620 results of 937 for search '"explosives"', query time: 0.04s Refine Results
  1. 601
  2. 602

    An Ant Colony Optimization Based Feature Selection for Web Page Classification by Esra Saraç, Selma Ayşe Özel

    Published 2014-01-01
    “…The increased popularity of the web has caused the inclusion of huge amount of information to the web, and as a result of this explosive information growth, automated web page classification systems are needed to improve search engines’ performance. …”
    Get full text
    Article
  3. 603

    Ikere-Ekiti in Art and Cultural Narratives by dele jegede

    Published 2021-12-01
    “…But it is the annual celebration of the Olosunta festival that serves as the rallying point for the indigenes of the city at the same time that it provides a time-honored structure for handling potentially explosive cultural and political contestations. …”
    Get full text
    Article
  4. 604

    Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network by Haojie HUANG, Xiaoxiao WU, Gangqiang LI

    Published 2020-06-01
    “…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
    Get full text
    Article
  5. 605

    Novel Method of Analysis for the Determination of Residual Formaldehyde by High-Performance Liquid Chromatography by Vittoria Delbono, Christopher P. Larch, Katrina Carol Newlands, Shona Rhydderch, Thomas Craven Baddeley, John Mervyn David Storey

    Published 2022-01-01
    “…For these reasons, the majority of papers found in the literature are based upon a derivatisation process (most commonly using the desensitised explosive 2,4-dinitrophenylhydrazine) prior to the analysis of formaldehyde. …”
    Get full text
    Article
  6. 606

    Study on the Mechanism of Sparks Generated Mechanical Friction by He Pan, Yang Zhang

    Published 2022-01-01
    “…In the field of explosion protection, measures must be taken to prevent ignition sources due to mechanical friction and impact. …”
    Get full text
    Article
  7. 607

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  8. 608

    Ensuring Safety and Reliability: An Overview of Lithium-Ion Battery Service Assessment by Cezar Comanescu

    Published 2024-12-01
    “…The importance of safety has been underscored by numerous incidents, such as the well-known smartphone battery explosions and more than 10,000 fires a year at facilities throughout Australia, both linked to LIB failures. …”
    Get full text
    Article
  9. 609

    Dissipation of Impact Stress Waves within the Artificial Blasting Damage Zone in the Surrounding Rocks of Deep Roadway by Jianguo Ning, Jun Wang, Yunliang Tan, Xinshuai Shi

    Published 2016-01-01
    “…Artificial explosions are commonly used to prevent rockburst in deep roadways. …”
    Get full text
    Article
  10. 610

    Using Improved Ant Colony Algorithm to Investigate EMU Circulation Scheduling Problem by Yu Zhou, Leishan Zhou, Yun Wang

    Published 2014-01-01
    “…However, due to the high acquisition and maintenance cost, it is impossible for decision-making departments to purchase enough EMUs to satisfy the explosive travel demand. Therefore, there is an urgent need to study how to utilize EMU more efficiently and reduce costs in the case of completing a given task in train diagram. …”
    Get full text
    Article
  11. 611

    Behaviors of Thin-Walled Cylindrical Shell Storage Tank under Blast Impacts by Shengzhuo Lu, Wei Wang, Weidong Chen, Jingxin Ma, Yaqin Shi, Chunlong Xu

    Published 2019-01-01
    “…Owing to the high risk of gas explosions and the resulting deaths, injuries, and economic losses, more thorough damage analyses of these large structures should be conducted. …”
    Get full text
    Article
  12. 612

    A New Era of Submillimeter GRB Afterglow Follow-Ups with the Greenland Telescope by Yuji Urata, Kuiyun Huang, Keiichi Asada, Hiroyuki Hirashita, Makoto Inoue, Paul T. P. Ho

    Published 2015-01-01
    “…Summarizing the current achievements of submm GRB follow-ups, we identify the following three scientific goals regarding GRBs: (1) systematic detection of bright submm emissions originating from reverse shock (RS) in the early afterglow phase, (2) characterization of forward shock and RS emissions by capturing their peak flux and frequencies and performing continuous monitoring, and (3) detections of GRBs at a high redshift as a result of the explosion of first generation stars through systematic rapid follow-ups. …”
    Get full text
    Article
  13. 613

    Design of an Uninterrupted Power Supply with Li-Ion Battery Pack: A Proposal for a Cost-Efficient Design with High Protection Features by Thealfaqar A. Abdul-jabbar, Adel A. Obed, Ahmed J. Abid

    Published 2021-06-01
    “…Besides, li-ion batteries require a safe and secure ground to reach the best performance and decrease the explosion risk. The safe operation of the battery is based on the main protection features and balancing the cells. …”
    Get full text
    Article
  14. 614

    Simulation of the Lower Head Boiling Water Reactor Vessel in a Severe Accident by Alejandro Nuñez-Carrera, Raúl Camargo-Camargo, Gilberto Espinosa-Paredes, Adrián López-García

    Published 2012-01-01
    “…The release of molten material to the primary containment and the possibility of steam explosion may produce the failure of the primary containment with high radiological consequences. …”
    Get full text
    Article
  15. 615

    CHF Phenomena by Photographic Study of Boiling Behavior due to Transient Heat Inputs by Jongdoc Park, Katsuya Fukuda, Qiusheng Liu

    Published 2012-01-01
    “…For the 2nd group with shorter periods, the direct transition to film boiling from non boiling occurs as an explosive boiling. The direct boiling transition at the CHF from non-boiling regime to film boiling occurred without a heat flux increase. …”
    Get full text
    Article
  16. 616

    A New Methodology for Hesitant Fuzzy Emergency Decision Making with Unknown Weight Information by Xiaodi Liu, Zengwen Wang, Shitao Zhang

    Published 2018-01-01
    “…Finally, a case study on a fire and explosion accident is given to illustrate the application of the proposed method. …”
    Get full text
    Article
  17. 617

    Crust and Uppermost Mantle Magma Plumbing System Beneath Changbaishan Intraplate Volcano, China/North Korea, Revealed by Ambient Noise Adjoint Tomography by Xingli Fan, Zhen Guo, Yang Zhao, Qi‐Fu Chen

    Published 2022-06-01
    “…Abstract Changbaishan volcano (CBV), straddling the border between China and North Korea, is one of the most intriguing and explosive volcanoes on Earth owing to its voluminous Holocene eruptions and unusual magma composition within a continental intraplate setting. …”
    Get full text
    Article
  18. 618

    Intelligent Monitoring System for Biogas Detection Based on the Internet of Things: Mohammedia, Morocco City Landfill Case by Jamal Mabrouki, Mourade Azrour, Ghizlane Fattah, Driss Dhiba, Souad El Hajjaji

    Published 2021-03-01
    “…Hazards levels, potential fire, and explosion risks associated with biogas are lower than those of natural gases in most cases. …”
    Get full text
    Article
  19. 619

    Research of stress distribution in the cross-section of a bimetallic perforated plate perpendicularly loaded with concentrated force by Mateusz Konieczny, Henryk Achtelik, Grzegorz Gasiak

    Published 2020-12-01
    “…The paper presents the stress distribution along the plate thickness in a bimetallic steel – titanium circular, axially symmetrical perforated plate produced in the technological process of explosion welding. The steel layer is the layer that transfers the load in the plate, while the titanium layer is used to improve the properties of the plate, e.g. corrosion resistance, thermal transmittance, etc. in the plate. …”
    Get full text
    Article
  20. 620

    Progress in Regenerative Dentistry Approaches: An Update by Maham shah, Reshma khatoon, Rashid Iqbal, Zaheer Ahmed Soomro, Mohsin Ali Dehraj, Muhammad Amin sahito

    Published 2025-01-01
    “… Advanced research in biomedical engineering, together with rising treatment standards and the demand for non-conventional methods, have contributed to the explosive growth of the field of dentistry known as regenerative dentistry. …”
    Get full text
    Article