-
541
Interim Storage of the Dalat Nuclear Research Reactor: Radiation Safety Analysis
Published 2020-01-01“…The photon source and decay heat of the spent HEU fuel bundles were calculated using the ORIGEN2.1 code. Gamma dose rates of the spent fuel interim storage were evaluated using the MCNP5 code with various scenarios of water levels in the reactor tank and cooling time. …”
Get full text
Article -
542
Hidden in plain sight: antisemitic content in QAnon subreddits.
Published 2025-01-01“…The language game involves an ingroup having specialized knowledge related to implicit language or dog whistles; the ingroup knows and uses the secret meaning of these terms as an insider's code. Content network analysis and qualitative coding illustrate that QAnon taught this insider's code by presenting the overt, antisemitic meanings of implicit terms and generalized narratives in posts that combined them with explicit language. …”
Get full text
Article -
543
Identification of virus-encoded microRNAs in divergent Papillomaviruses.
Published 2018-07-01“…MicroRNAs (miRNAs) are small RNAs that regulate diverse biological processes including multiple aspects of the host-pathogen interface. …”
Get full text
Article -
544
Validation of a rapid biomarker assay for lung cancer using the IntelliPlex panel
Published 2025-07-01“…Abstract A large proportion of non-small-cell lung cancer (NSCLC) patients harbor clinically actionable genomic alterations, detected in general by broad Next-Generation Sequencing (NGS) panels, since it is the gold standard test and strongly recommended by different societies. …”
Get full text
Article -
545
Study on the Development Characteristics of Ductile Shear Zone andDeformation Response of Slope Excavation in a Hydropower Station
Published 2020-01-01“…Inorder to study the mechanism and rule of deformation response of high rock slope excavation underthis condition, this paper selects the right-bank dam axis slope of hydropower station as theresearch object, and simulates the excavation process of the slope by the UDEC (universal distinctelement code). The results show that:(1) The excavation results in large deformation of theshallow rock mass in the ductile shear zone, which affects the stability of the slope; (2) Thedeformation caused by excavation is mainly controlled by the unloading fissure and overflowsurface that dipping toward to the outside slope, and the geological-mechanical deformation andfailure mode is mainly slipping and fracturing; (3) The slope mainly occurs lateral displacementafter excavation, and its cumulative displacement mode is transmission to high elevation andaccumulation at the trailing edge; (4) The slope excavation and the resulting deformation energyare kept in sync, and finally affected by the elastic recovery lag of rock mass, and the residualdeformation is small near the end of excavation.…”
Get full text
Article -
546
Development of sensitivity calculation capability of Legendre moments of scattering angular distributions in NECP-MCX
Published 2024-01-01“…In addition, the CLUTCH-FC (CLUTCH coupled with forced collisions) method is implemented to reduce the variance of sensitivity coefficients of Legendre moment of scattering angular distributions with relatively small scattering cross sections. The numerical results indicate that 1) the sensitivity coefficients calculated by NECP-MCX agree well with those by Serpent and ERANOS, and 2) the CLUTCH-FC method is efficient in reducing the variance of sensitivity coefficients of Legendre moment of scattering angular distributions with relatively small scattering cross sections. …”
Get full text
Article -
547
Gas-Cooled Thorium Reactor with Fuel Block of the Unified Design
Published 2015-01-01“…Such small modular reactor systems at good commercial, competitive level are capable of creating the basis of the regional power industry of the Russian Federation. …”
Get full text
Article -
548
TLINet: A defects detection method for insulators of overhead transmission lines using partially transformer block.
Published 2025-01-01“…The defects of insulators exhibit characteristics such as complex backgrounds, multi-scale variations, and small object sizes. Therefore, accurately focusing on these defects in dynamic and complex natural environments while maintaining inference speed remains a pressing challenge. …”
Get full text
Article -
549
Participatory Research (PR) Working With Adolescent Research Assistants in a Specialist School
Published 2024-04-01“…The SEND Code of Practice (DfE & DoH, 2015) and a growing body of literature highlight the need to “unmute” the voices of children and young people (Alderson, 2008; Christensen & James, 2008; Kellett, 2010). …”
Get full text
Article -
550
Refining Integration-by-Parts Reduction of Feynman Integrals with Machine Learning
Published 2025-05-01“…Both approaches manage to re-discover the state-of-the-art heuristics recently incorporated into integration-by-parts solvers, and in one example find a small advance on this state of the art.…”
Get full text
Article -
551
Delay-constrained flooding in extremely low-duty-cycle sensor networks
Published 2019-03-01“…Based on the large-scale simulations, we validate that our design can reduce flooding delay with small extra energy expenditure compared with conventional flooding schemes.…”
Get full text
Article -
552
A Characterization of Power Method Transformations through L-Moments
Published 2011-01-01Get full text
Article -
553
Analysis of space labeling through binary fingerprinting
Published 2019-08-01“…Our approach can be considered, for example, when we use very small, inexpensive beacons, like those based on bluetooth low energy technology, radio frequency identification, or in the future context of the Internet of Things. …”
Get full text
Article -
554
Research on Primary Knock-on Atom and DPA Calculation in SiC Fuel Clad of Micro Gas-cooled Reactor
Published 2025-01-01“…In addition, inelastic scattering also makes a small contribution. The additional recoils due to the subsequent decay of radionuclides produced by transmutation reactions were further considered using a self-developed neutron activation analysis code named NIAC. …”
Article -
555
Vehicle detection in drone aerial views based on lightweight OSD-YOLOv10
Published 2025-07-01“…We also construct a dual small-target detection layer that combines shallow and ultra-shallow features to improve small-target detection. …”
Get full text
Article -
556
Exploring the potential of lightweight large language models for AI-based mental health counselling task: a novel comparative study
Published 2025-07-01“…In this study, lightweight open source LLMs such as Google’s T5s (small variant), BARTB (base variant), FLAN-T5s (small variant), and Microsoft’s GODELB (base variant) have been fine-tuned for automated mental health counseling task utilizing a diverse set of datasets publicly available online. …”
Get full text
Article -
557
The challenges of replication: A worked example of methods reproducibility using electronic health record data.
Published 2025-01-01“…<h4>Conclusion</h4>Even with perfect code sharing, data reproducibility remains a challenge. …”
Get full text
Article -
558
Information system for nuclear material accounting and control
Published 2021-07-01“…The system contains fully completed reference books (small journals referenced by all major journals in the database) with the necessary reference data in accordance with Code 10. …”
Get full text
Article -
559
Automatic Detection of Tiny Drainage Outlets and Ventilations on Flat Rooftops from Aerial Imagery
Published 2025-07-01“…The labeled dataset used in this study is publicly available by following this link <code>https://zenodo.org/records/14040571</code>.…”
Get full text
Article -
560
Control de configuraciones peligrosas en instalaciones con riesgo asociado // Hazardous configurations control in risk related facilities
Published 2010-05-01“…<strong><span style="font-family: Arial; font-size: small;"><strong><span style="font-family: Arial; font-size: small;"><p>Resumen</p></span></strong></span></strong><span style="font-family: Arial; font-size: x-small;"><span style="font-family: Arial; font-size: x-small;"><p>El control de configuraciones peligrosas en instalaciones con riesgo asociado es una aplicación de</p><p>los Análisis Probabilistas de Seguridad (APS) previos de las mismas. …”
Get full text
Article