-
801
Joint Investigation and 3D Visual Evaluation of Rock Mass Quality
Published 2020-01-01Get full text
Article -
802
Nebular and Nonthermal Radio Emissions for Young Stellar Populations with PARSEC v1.2s
Published 2025-01-01“…We account for the electron temperature dependence on IMF upper mass limit and metallicity while computing the thermal radio emission component, and also accounted for recent advances in core-collapse supernova explosion models while computing the nonthermal radio emission component. …”
Get full text
Article -
803
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
804
Conceptual and Simulated Semi-Automatic Urban Waste Management System using Global Systems for Mobile Communication and Customer Reliability Indices
Published 2019-08-01“…The challenges are fuelled by population explosions all over the world, especially in the major urban centres, against the backdrop of limited resources to manage wastes efficiently. …”
Get full text
Article -
805
Globalization, Security and Governance Challenges in Nigeria
Published 2024-09-01“…The study therefore recommended that Nigeria need to be at the forefront of promoting the establishment of a strong economic bloc among African nations with the goal of curbing the explosive trend of globalization toward the proliferation of weapons and other types of transnational crimes. …”
Get full text
Article -
806
Local 2D Simulations of the Ignition of a Helium Shell Detonation on a White Dwarf by an Impacting Stream
Published 2025-01-01“…The double detonation model is one of the prevalent explosion mechanisms of Type Ia supernovae (SNe Ia) wherein an outer helium shell detonation triggers a core detonation in the white dwarf (WD). …”
Get full text
Article -
807
Performance Optimization of Cloud Data Centers with a Dynamic Energy-Efficient Resource Management Scheme
Published 2021-01-01“…However, with the proliferation of large data centers hosting cloud applications, the growth of energy consumption has been explosive. Surveys show that a remarkable part of the large energy consumed in data center results from over-provisioning of the network resource to meet requests during peak demand times. …”
Get full text
Article -
808
Conceptual and Simulated Semi-Automatic Urban Waste Management System using Global Systems for Mobile Communication and Customer Reliability Indices
Published 2019-08-01“…The challenges are fuelled by population explosions all over the world, especially in the major urban centres, against the backdrop of limited resources to manage wastes efficiently. …”
Get full text
Article -
809
Exhaled Jet and Viral-Laden Aerosol Transport from Nasal Sneezing
Published 2022-03-01“…Nasal sneezing is characterised by an explosive blast of air exiting the nostrils, which can be considered as dual jets, resulting in the spread of viral-laden aerosols remaining suspended in the air. …”
Get full text
Article -
810
ESO-Based Non-Singular Terminal Filtered Integral Sliding Mode Backstepping Control for Unmanned Surface Vessels
Published 2025-01-01“…Meanwhile, to circumvent the differential explosion issue in traditional backstepping control, we simplify the controller design by utilizing a second-order sliding mode filter to accurately estimate the differential signals of the virtual control quantities. …”
Get full text
Article -
811
Anomaly Detection for Time Series with Difference Rate Sample Entropy and Generative Adversarial Networks
Published 2021-01-01“…The spontaneous combustion of residual coals in the mined-out area tends to cause an explosion, which is one kind of severe thermodynamic compound disaster of coal mines and leads to serious losses to people's lives and production safety. …”
Get full text
Article -
812
Why Does Pnemococcus Kill?
Published 1999-01-01“…Knowledge of the chronology of microbiological and inflammatory events that occur during pneumonia may help to design appropriate diagnostic tests that could be used to monitor the evolution of this deadly infection. There has been an explosive growth in the use of biological response modifiers that may be given to treat pneumonia. …”
Get full text
Article -
813
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01“…Moreover, traditional approaches have predominantly utilized entities in textual data as service attributes, resulting in coarse granularity, uncontrollable scale and management level, further leading to the problem of attribute-space explosion. Thus, a secure service attribute generation mechanism for textual data (IDSAM) was introduced. …”
Get full text
Article -
814
Presentación del dossier. Naturaleza y crisis del capitalismo
Published 2010-01-01“…Luego, durante el 2008, con la explosión de la inmensa burbuja especulativa creada en los mercados bursátiles norteamericanos, principalmente en el mercado inmobiliario. …”
Get full text
Article -
815
Efficiency Analysis of Fragmentation Warheads Through Advanced Modeling Techniques: Experimental and Numerical Study
Published 2024-01-01“…This study explicitly addresses key research gaps, including the integration between experimental and numerical analyses, the gap between explosive propulsion and the determination of efficiency, and the need for a comprehensive tool for warhead design and optimization. …”
Get full text
Article -
816
Bidirectional Collaborative Optimization Scheduling of Adjustable Resources in Computing Node and Power Node
Published 2025-02-01“…They have also made the bidirectional collaborative optimization of computing and electricity into a new method of economic optimization in comprehensive energy systems. The explosive growth in computational demand has led to a shortage of computational resources. …”
Get full text
Article -
817
Fault localization for automatic train operation based on the adaptive error locating array algorithm
Published 2025-01-01“…Abstract When the combinatorial testing method is used to locate faults in the complex signalling system of high-speed rail in order to prevent the system from being affected by combinatorial testing case explosion, which could results from the masking effects caused by multiple faults, the Minimum Fault Schema (MFS) can be accurately and efficiently located. …”
Get full text
Article -
818
Zein patterns as effective markers of valuable agronomic traits in maize
Published 2023-07-01“…On the examples of such agronomic traits as early maturity, explosiveness, and waxiness of maize grain, the possibility of controlling the “inclusion” of these traits in the breeding material with the help of zein markers has been demonstrated. …”
Get full text
Article -
819
DESIGNING A COMPACT FIREFIGHTING VEHICLE FOR NARROW RESIDENTIAL AREAS ON THE BASE OF A LAWN MOWER
Published 2023-12-01“…With the explosion of urbanization, more and more small residential areas with high population density, tiny houses, and narrow roads are formed. …”
Get full text
Article -
820
Safety of electromagnetic factors for the workplace equipped with personal computers in residential premises
Published 2022-04-01“…Residential buildings are not subject to the requirements of the Energy Supervision services; therefore, any unprofessional modification of electrical networks in residential premises, including the use of unapproved extension cords, may result in sparking, high-frequency harmonics, and, in turn, conditions which impact human health, as well as electric injures, fires, and gas explosions.Conclusions. It has been shown that IT (TT) mode symmetrical two-phase electrical networks may function efficiently for decades without accidents and effects of industrial frequency electromagnetic field on humans, as they are used in medical institutions, defense enterprises, and state institutions. …”
Get full text
Article