Zobrazeno 1 - 10
of 1 344
pro vyhledávání: '"He Biao"'
Publikováno v:
SAGE Open, Vol 14 (2024)
This study investigates the predictive power of sentiment metrics concerning the volatility of tourism-related stocks listed on the Pakistan Stock Exchange (PSX) during recent crises. We employed univariate and multivariate GARCH-family econometric m
Externí odkaz:
https://doaj.org/article/154a53627fd44a25a0cebfc0e49e0a34
Publikováno v:
Jixie chuandong, Vol 44, Pp 24-30 (2020)
In order to improve the energy consumption economy of a plug-in axle-split hybrid electric vehicle (PHEV),a rule-based energy management strategy is established,and the corrected power factor and speed limits value for engine startup are intr
Externí odkaz:
https://doaj.org/article/81d23215522f4fd1a71e99f6a884b7e1
In the present work, we systematically study the spectroscopic factor of proton radioactivity ($S_p$) with $A>100$ using the deformed two-potential approach (D-TPA). It is found that there is a link between the quadrupole deformation parameter of pro
Externí odkaz:
http://arxiv.org/abs/2403.04249
Publikováno v:
Dianzi Jishu Yingyong, Vol 44, Iss 4, Pp 10-13 (2018)
With the increasing variety and enhancing function of unmanned aerial vehicle(UAV) payload, data recorder, as an important avionics equipment to record UAV flight status and payload information, is also faced with the challenges of increasing recordi
Externí odkaz:
https://doaj.org/article/e5b7184021604fdeb13e6f1dbe1419c0
Autor:
Cao, Sicong, He, Biao, Sun, Xiaobing, Ouyang, Yu, Zhang, Chao, Wu, Xiaoxue, Su, Ting, Bo, Lili, Li, Bin, Ma, Chuanlei, Li, Jiajia, Wei, Tao
Java deserialization vulnerability is a severe threat in practice. Researchers have proposed static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate proof-of-concept (PoC) serialized objects to trigger them. Ho
Externí odkaz:
http://arxiv.org/abs/2304.04233
Autor:
Cao, Sicong, Sun, Xiaobing, Wu, Xiaoxue, Bo, Lili, Li, Bin, Wu, Rongxin, Liu, Wei, He, Biao, Ouyang, Yu, Li, Jiajia
Java (de)serialization is prone to causing security-critical vulnerabilities that attackers can invoke existing methods (gadgets) on the application's classpath to construct a gadget chain to perform malicious behaviors. Several techniques have been
Externí odkaz:
http://arxiv.org/abs/2303.07593
Publikováno v:
In Construction and Building Materials 18 October 2024 448
In the present work, we systematically study the two-proton (2p) radioactivity half-lives of nuclei close to the proton drip line within a modified Gamow-like model. Using this model, the calculated 2p radioactivity half-lives can well reproduce the
Externí odkaz:
http://arxiv.org/abs/2111.14115
Systematic study on proton radioactivity of spherical proton emitters within two--potential approach
In the present work we systematically study the half--lives of proton radioactivity for spherical proton emitters with ${Z\ge 69}$ based on two--potential approach. While the nuclear potential of the emitted proton--daughter nucleus is adopted by a p
Externí odkaz:
http://arxiv.org/abs/2110.15230
In this work, we systematically study the two-proton($2p$) radioactivity half-lives using the two-potential approach while the nuclear potential is obtained by using Skyrme-Hartree-Fock approach with the Skyrme effective interaction of {SLy8}. For tr
Externí odkaz:
http://arxiv.org/abs/2109.07178