Results 11 to 20 of about 102,528 (248)

Particle distribution characteristics of rock avalanche and the interaction between rock avalanche and houses based on image recognition

open access: yes地质科技通报, 2021
Due to the high concealment, short-lived time and low predictability of the rock avalanche, it is difficult to visually observe the process of it. In order to study the dynamic characteristics and the catastrophicto houses of rock avalanche, this paper ...
Shuangqi Peng   +3 more
doaj   +1 more source

The fatalities and injuries due to avalanche effect in the Himalayan Region, Nepal

open access: yesBibechana, 2023
Snow avalanches present the major natural hazard in Himalayan region of Nepal.  The loss of human life is the main effect of avalanche. The records and casualties compared with specific Europe countries which help to analyze the hazard in the mountain ...
Pitri Bhakta Adhikari   +2 more
doaj   +3 more sources

A user perspective on the avalanche danger scale – insights from North America [PDF]

open access: yesNatural Hazards and Earth System Sciences, 2023
Danger ratings are used across many fields to convey the severity of a hazard. In snow avalanche risk management, danger ratings play a prominent role in public bulletins by concisely describing existing and expected conditions.
A. Morgan   +4 more
doaj   +1 more source

Proton radiation effect on InAs avalanche photodiodes [PDF]

open access: yesOptics Express, 2017
With increasing interest over the past decade in space-related remote sensing and communications using near-infrared (NIR) wavelengths, there is a need for radiation studies on NIR avalanche photodiodes (APDs), due to the high radiation environment in space.
Zhou, X.   +9 more
openaire   +4 more sources

Hashing technique based on SHA-3 using chaotic maps1

open access: yesInformatika, 2020
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj   +1 more source

Exploring the relationship between avalanche hazard and run list terrain choices at a helicopter skiing operation [PDF]

open access: yesNatural Hazards and Earth System Sciences, 2019
While guides in mechanized skiing operations use a well-established terrain selection process to limit their exposure to avalanche hazard and keep the residual risk at an acceptable level, the relationship between the open/closed status of runs and ...
R. Sterchi, P. Haegeli, P. Mair
doaj   +1 more source

Avalanche effects near nanojunctions

open access: yesPhysical Review E, 2016
In this article, we perform a computational investigation of a nanopore connected to external fluidic reservoirs of asymmetric geometries. The asymmetry between the reservoirs is achieved by changing the cross-sectional areas, and the reservoirs are designated as the micropore reservoir and macropore reservoir.
Vishal V R, Nandigana, N R, Aluru
openaire   +3 more sources

Radiation damage effect on avalanche photodiodes [PDF]

open access: yesNuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, 1999
Abstract Avalanche photodiodes have been chosen as photon sensors for the electromagnetic calorimeter of the CMS experiment at the LHC. These sensors should operate in the 4 T magnetic field of the experiment. Because of the high neutron radiation in the detector extensive studies have been done by the CMS collaboration on the APD neutron radiation ...
S. Baccaro   +19 more
openaire   +3 more sources

Constructions of pseudorandom binary lattices using cyclotomic classes in finite fields

open access: yesOpen Mathematics, 2020
In 2006, Hubert, Mauduit and Sárközy extended the notion of binary sequences to n-dimensional binary lattices and introduced the measures of pseudorandomness of binary lattices.
Chen Xiaolin
doaj   +1 more source

The LBC-3 lightweight encryption algorithm

open access: yesOpen Engineering, 2022
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys.
Nyssanbayeva Saule   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy