Showing 801 - 820 results of 937 for search '"explosives"', query time: 0.05s Refine Results
  1. 801
  2. 802

    Nebular and Nonthermal Radio Emissions for Young Stellar Populations with PARSEC v1.2s by Ikechukwu A. Obi, Pius N. Okeke, Bonaventure I. Okere

    Published 2025-01-01
    “…We account for the electron temperature dependence on IMF upper mass limit and metallicity while computing the thermal radio emission component, and also accounted for recent advances in core-collapse supernova explosion models while computing the nonthermal radio emission component. …”
    Get full text
    Article
  3. 803

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  4. 804

    Conceptual and Simulated Semi-Automatic Urban Waste Management System using Global Systems for Mobile Communication and Customer Reliability Indices by L. Ogunwolu, A.D. Omiyale, O.O.E. Ajibola

    Published 2019-08-01
    “…The challenges are fuelled by population explosions all over the world, especially in the major urban centres, against the backdrop of limited resources to manage wastes efficiently. …”
    Get full text
    Article
  5. 805

    Globalization, Security and Governance Challenges in Nigeria by WILSON SIMON OKWOLI, LAMI LENTON ANUGA, JOSEPH ABOGENYE ANUGA

    Published 2024-09-01
    “…The study therefore recommended that Nigeria need to be at the forefront of promoting the establishment of a strong economic bloc among African nations with the goal of curbing the explosive trend of globalization toward the proliferation of weapons and other types of transnational crimes. …”
    Get full text
    Article
  6. 806

    Local 2D Simulations of the Ignition of a Helium Shell Detonation on a White Dwarf by an Impacting Stream by Nethra Rajavel, Dean M. Townsley, Ken J. Shen

    Published 2025-01-01
    “…The double detonation model is one of the prevalent explosion mechanisms of Type Ia supernovae (SNe Ia) wherein an outer helium shell detonation triggers a core detonation in the white dwarf (WD). …”
    Get full text
    Article
  7. 807

    Performance Optimization of Cloud Data Centers with a Dynamic Energy-Efficient Resource Management Scheme by Yu Cui, Shunfu Jin, Wuyi Yue, Yutaka Takahashi

    Published 2021-01-01
    “…However, with the proliferation of large data centers hosting cloud applications, the growth of energy consumption has been explosive. Surveys show that a remarkable part of the large energy consumed in data center results from over-provisioning of the network resource to meet requests during peak demand times. …”
    Get full text
    Article
  8. 808

    Conceptual and Simulated Semi-Automatic Urban Waste Management System using Global Systems for Mobile Communication and Customer Reliability Indices by L. Ogunwolu, A.D. Omiyale, O.O.E. Ajibola

    Published 2019-08-01
    “…The challenges are fuelled by population explosions all over the world, especially in the major urban centres, against the backdrop of limited resources to manage wastes efficiently. …”
    Get full text
    Article
  9. 809

    Exhaled Jet and Viral-Laden Aerosol Transport from Nasal Sneezing by Hana Salati, David F. Fletcher, Mehrdad Khamooshi, Jingliang Dong, Kazuhide Ito, Sara Vahaji, Kiao Inthavong

    Published 2022-03-01
    “…Nasal sneezing is characterised by an explosive blast of air exiting the nostrils, which can be considered as dual jets, resulting in the spread of viral-laden aerosols remaining suspended in the air. …”
    Get full text
    Article
  10. 810

    ESO-Based Non-Singular Terminal Filtered Integral Sliding Mode Backstepping Control for Unmanned Surface Vessels by Jianping Yuan, Zhuohui Chai, Qingdong Chen, Zhihui Dong, Lei Wan

    Published 2025-01-01
    “…Meanwhile, to circumvent the differential explosion issue in traditional backstepping control, we simplify the controller design by utilizing a second-order sliding mode filter to accurately estimate the differential signals of the virtual control quantities. …”
    Get full text
    Article
  11. 811

    Anomaly Detection for Time Series with Difference Rate Sample Entropy and Generative Adversarial Networks by Keke Gao, Wenbin Feng, Xia Zhao, Chongchong Yu, Weijun Su, Yuqing Niu, Lu Han

    Published 2021-01-01
    “…The spontaneous combustion of residual coals in the mined-out area tends to cause an explosion, which is one kind of severe thermodynamic compound disaster of coal mines and leads to serious losses to people's lives and production safety. …”
    Get full text
    Article
  12. 812

    Why Does Pnemococcus Kill? by Yves Bergeron, Michel G Bergeron

    Published 1999-01-01
    “…Knowledge of the chronology of microbiological and inflammatory events that occur during pneumonia may help to design appropriate diagnostic tests that could be used to monitor the evolution of this deadly infection. There has been an explosive growth in the use of biological response modifiers that may be given to treat pneumonia. …”
    Get full text
    Article
  13. 813

    Instruction and demonstration-based secure service attribute generation mechanism for textual data by LI Chenhao, WANG Na, LIU Aodi

    Published 2024-12-01
    “…Moreover, traditional approaches have predominantly utilized entities in textual data as service attributes, resulting in coarse granularity, uncontrollable scale and management level, further leading to the problem of attribute-space explosion. Thus, a secure service attribute generation mechanism for textual data (IDSAM) was introduced. …”
    Get full text
    Article
  14. 814

    Presentación del dossier. Naturaleza y crisis del capitalismo by Franklin Ramírez

    Published 2010-01-01
    “…Luego, durante el 2008, con la explosión de la inmensa burbuja especulativa creada en los mercados bursátiles norteamericanos, principalmente en el mercado inmobiliario. …”
    Get full text
    Article
  15. 815

    Efficiency Analysis of Fragmentation Warheads Through Advanced Modeling Techniques: Experimental and Numerical Study by Omar Alameri, Predrag Elek

    Published 2024-01-01
    “…This study explicitly addresses key research gaps, including the integration between experimental and numerical analyses, the gap between explosive propulsion and the determination of efficiency, and the need for a comprehensive tool for warhead design and optimization. …”
    Get full text
    Article
  16. 816

    Bidirectional Collaborative Optimization Scheduling of Adjustable Resources in Computing Node and Power Node by ZHOU Qianyufan, YANG Ping, WAN Siyang, CUI Jiayan, LI Fengneng, WEI Zhichu

    Published 2025-02-01
    “…They have also made the bidirectional collaborative optimization of computing and electricity into a new method of economic optimization in comprehensive energy systems. The explosive growth in computational demand has led to a shortage of computational resources. …”
    Get full text
    Article
  17. 817

    Fault localization for automatic train operation based on the adaptive error locating array algorithm by Yanpeng Zhang, Yuxiang Cao

    Published 2025-01-01
    “…Abstract When the combinatorial testing method is used to locate faults in the complex signalling system of high-speed rail in order to prevent the system from being affected by combinatorial testing case explosion, which could results from the masking effects caused by multiple faults, the Minimum Fault Schema (MFS) can be accurately and efficiently located. …”
    Get full text
    Article
  18. 818

    Zein patterns as effective markers of valuable agronomic traits in maize by V. V. Sidorova, A. V. Konarev, Yu. A. Kerv

    Published 2023-07-01
    “…On the examples of such agronomic traits as early maturity, explosiveness, and waxiness of maize grain, the possibility of controlling the “inclusion” of these traits in the breeding material with the help of zein markers has been demonstrated. …”
    Get full text
    Article
  19. 819

    DESIGNING A COMPACT FIREFIGHTING VEHICLE FOR NARROW RESIDENTIAL AREAS ON THE BASE OF A LAWN MOWER by Thong Duc HONG, Phat Tan TRUONG, Minh Quang PHAM, Lam Quang TRAN

    Published 2023-12-01
    “…With the explosion of urbanization, more and more small residential areas with high population density, tiny houses, and narrow roads are formed. …”
    Get full text
    Article
  20. 820

    Safety of electromagnetic factors for the workplace equipped with personal computers in residential premises by Yu. G. Ryabov, N. M. Legkiy, G. V. Lomaev

    Published 2022-04-01
    “…Residential buildings are not subject to the requirements of the Energy Supervision services; therefore, any unprofessional modification of electrical networks in residential premises, including the use of unapproved extension cords, may result in sparking, high-frequency harmonics, and, in turn, conditions which impact human health, as well as electric injures, fires, and gas explosions.Conclusions. It has been shown that IT (TT) mode symmetrical two-phase electrical networks may function efficiently for decades without accidents and effects of industrial frequency electromagnetic field on humans, as they are used in medical institutions, defense enterprises, and state institutions. …”
    Get full text
    Article