Showing 641 - 660 results of 2,763 for search '"The Terminator"', query time: 0.06s Refine Results
  1. 641

    Investigating the Multidomain Impact of Palliative Care on End-of-Life Patients: A Comprehensive Evaluation by Mohammad O. Abu Hasheesh

    Published 2025-01-01
    “…Conclusion: In light of the results, it is evident that there is a pressing need to consistently evaluate the healthcare services offered to meet the needs of the increasing population of terminally ill patients.…”
    Get full text
    Article
  2. 642

    Research on control strategy of bidirectional DC-DC converter based on improved genetic algorithm by LI Li, CHEN Can, LI Can, GAO Feifan, CHEN Zhuaixia, LIU Yang, ZHOU Hongxi

    Published 2024-05-01
    “…A circuit model of buck/boost was constructed, and an adaptive fast terminal sliding mode control strategy was designed. …”
    Get full text
    Article
  3. 643

    A Simple Exact Penalty Function Method for Optimal Control Problem with Continuous Inequality Constraints by Xiangyu Gao, Xian Zhang, Yantao Wang

    Published 2014-01-01
    “…We consider an optimal control problem subject to the terminal state equality constraint and continuous inequality constraints on the control and the state. …”
    Get full text
    Article
  4. 644

    A Novel Ultrawideband Planar Inverted-F Antenna with Capacitive Ground Plane by Haixia Liu, Fei Wang, Yang Yang, Xiaowei Shi, Long Li

    Published 2013-01-01
    “…With the trend of the miniaturization, broadband, and integration of multisystems of wireless communication terminals, a new ultrawideband planar inverted-F antenna (PIFA) with capacitive ground plane is proposed in this paper. …”
    Get full text
    Article
  5. 645

    Velocity Control for Coning Motion Missile System Using Direct Discretization Method by Rui-sheng Sun, Chao Ming

    Published 2015-01-01
    “…This paper presents a new coning motion control methodology, which takes into account the terminal speed constraint to design the velocity control system for a missile. …”
    Get full text
    Article
  6. 646

    Child with Deletion 9p Syndrome Presenting with Craniofacial Dysmorphism, Developmental Delay, and Multiple Congenital Malformations by Nirmala D. Sirisena, U. Kalpani S. Wijetunge, Ramya de Silva, Vajira H. W. Dissanayake

    Published 2013-01-01
    “…A 4-month-old Sri Lankan male child case with a de novo terminal deletion in the p22→pter region of chromosome 9 is described. …”
    Get full text
    Article
  7. 647

    Macroscopic investigations on the afferent and efferent lymph vessels of the cervical superficial node and popliteal lymph node in akkaraman sheep by Sadettin Tıpırdamaz, Necdet Dursun, Hasan Erden, Memduh Gezici, İ. Hakkı Nur

    “…Efferents on the left side terminate in the external jugular vein. On the right side, the efferents terminate in the right r lyrhph duct.…”
    Get full text
    Article
  8. 648

    Severe Congenital Toxoplasmosis: A Case Report and Strain Characterization by Bahador Sarkari, Samaneh Abdolahi Khabisi

    Published 2015-01-01
    “…Fetal scan showed anomaly in fetus including mild hydrocephaly. Termination of the pregnancy was suggested by the physician and pregnancy was terminated 178 days after conception.…”
    Get full text
    Article
  9. 649

    A Nomogram utilizing ECG P-wave parameters to predict recurrence risk following catheter ablation in paroxysmal atrial fibrillation by Li-juan Yu, Xue-Hai Chen, Zhe Xu, Ke-Zeng Gong, Fei-Long Zhang

    Published 2025-01-01
    “…Preoperative absolute values of Maximum P Wave Duration, P Wave Dispersion, and P Wave Terminal Force of V1, as well as postoperative absolute values of Maximum P Wave Duration, P Wave Duration, P Wave Dispersion, P Wave Terminal Force of V1, and P Wave Area, demonstrate strong predictive value for recurrence risk of paroxysmal atrial fibrillation after Catheter Ablation. …”
    Get full text
    Article
  10. 650

    Efficient handover authentication and secure key-updating mechanism for B5G networks by Qimei CUI, Wenjing ZHAO, Xiaoyang GU, Zengbao ZHU, Xiaoxuan ZHU, Xiaofeng TAO, Wei NI

    Published 2021-12-01
    “…In order to solve the problems of 5G network handover authentication and key update mechanism, such as lacking of forward security, being vulnerable to bypass attack and having signaling congestion, for 5G enhanced (B5G) network, an efficient handover authentication and security key-updating mechanism based on no certificate was proposed.The certificateless key agreement mechanism was introduced in the network edge side, which made the mobile terminals in-itiate the key-updating request actively and complete the whole certificateless key-updating process on the fly.The security of the key-updating mechanism was proved theoretically based on the Diffie-Hellman problem under the eCK security model.Simulation results demonstrate that the proposed mechanism not only meets the forward security of mobile terminal key management, but also has lower communication and computing overheads compared with other similar handoff authentication.…”
    Get full text
    Article
  11. 651

    Idea zrównoważonego rozwoju jako idea rozwoju harmonijnego by Roman Tomanek

    Published 2018-12-01
    “…Sam termin przyjmuje rożne znaczenia w zależności od obszarów jego zastosowania. …”
    Get full text
    Article
  12. 652

    Robust Finite-Time Tracking Control Based on Disturbance Observer for an Uncertain Quadrotor under External Disturbances by Hamid Hassani, Anass Mansouri, Ali Ahaitouf

    Published 2022-01-01
    “…A novel supertwisting nonsingular terminal sliding mode control (STNTSMC) has been developed to ensure that the tracking errors vanish in a short finite-time. …”
    Get full text
    Article
  13. 653

    Off-line emergency communication method of power internet of things based on edge computing by Donghong FU, Dan LIU, Guijun SHI, Anxin WANG, Chunxue FAN, Haijun WANG, Yiying ZHANG

    Published 2018-03-01
    “…A new multi-mode node was designed for the emergency communication with the demand of electricity.The node had the multi-mode communication capability of the private network and the public network technology,which could switch smoothly in three modes:the power private network,the wireless Ad Hoc network and the wireless public network.Data were automatically uploaded to the multi-mode terminal,multi-mode terminal through the mode of rapid switching,with the public network resources to achieve rapid network recovery and continuous transmission of data to achieve off-line emergency communications.Meanwhile,an intelligent routing algorithm based on smoothness was proposed,and the three principles of edge network communication were defined.Through the edge calculation method,the calculation and updating of the smoothness were realized to ensure the intelligent,efficient and reliable operation of the edge network in the offline state.…”
    Get full text
    Article
  14. 654

    A general way to assign IPv6 trusted address under portal authentication by Jiang ZHOU, Hewu LI

    Published 2019-12-01
    “…As the network scale grows,it is especially important to fine-tune the network.In the next-generation Internet,embedding the user's trusted identity into the IPv6 address suffix to assign trusted addresses can further improve the traceability of network behavior.At present,many studies have attempted to embed the user’s identity information into IPv6 addresses based on portal authentication and DHCPv6,but the modification of DHCPv6 makes it not transparent to the terminal.A mechanism for trusted address assignment in IPv6 networks based on portal authentication was proposed.The collaboration between servers and software-defined networking (SDN) technology was used to realize the indirect assignment of IPv6 trusted addresses.Finally,a prototype system was implemented and its feasibility and performance were evaluated in the network of Nanjing Telecom in Jiangsu.The results show that the mechanism only brings little overhead and it is transparent to the terminal.…”
    Get full text
    Article
  15. 655

    Mobile crowd sensing coverage and energy optimization in smart coalmine by Chaowei WANG, Ting LIU, Tianyu WANG, Weidong WANG

    Published 2020-12-01
    “…Mobile crowd sensing (MCS) is a promising diagram for the environmental information collection based on the smart mobile terminal.Nowadays,vehicles with multiple embedded sensors are increasingly being considered as participants to complete various sensing tasks.In order to better perceive the data in the coalmine environment,the coverage quality and energy consumption of the perception data of sensing terminals were studied based on MCS.A new sensing coverage quality indicator called utility function F(Ω) jointly considering the coverage percentage and coverage density was defined.The selection of vehicles as an optimization problem to improve the coverage quality was formulated,then an improved greedy algorithm-coverage quality optimization (CQO) algorithm was proposed.The proposed algorithm with the real vehicle trajectory dataset was formulated and several factors influencing the coverage quality were studied.The experiment results show that the proposed algorithm achieves a better coverage quality.…”
    Get full text
    Article
  16. 656

    Research on Space-Based Integrated Internet of Things Architecture and Interference Analysis by Gengxin ZHANG, Xiaojin DING, Zhicheng QU

    Published 2020-12-01
    “…Considering “internet of everything” of the future internet of things (IoT), the space-based integrated IoT architecture was designed, and the interference scenarios of the coexistence of satellite and ground was analyzed, with the aid of analyzing the architectures of the spatial information network and space-based access network.Specifi cally, fi rstly, relying on both the integration of satellite network and ground network, and the advanced design concept of decoupling control and data, a spacebased satellite IoT architecture was designed in the presence of the specifi c characteristics of access network and terminals, which included space-based backbone network, space-based access network, ground-based IoT, core network and multimodal IoT terminals.Moreover, the process of space-based control plane was also given.Secondly, interference analysis was carried out for satellite spectrum sharing scenario and satellite-ground spectrum sharing scenario respectively, and preliminary analysis results were presented.…”
    Get full text
    Article
  17. 657

    Thoughts on the rapid formation of China’s space-ground integrated communication operation capability by Lingcai YANG

    Published 2022-04-01
    “…The space-ground integrated communication network is an essential part of the intelligent and comprehensive digital information infrastructure.It is of great significance to accelerate the formation of China’s space-ground integrated communication operation capability.Firstly, the domestic and overseas research status of the space-ground integrated communication capability, as well as the gap from industrial application was analyzed.Then, a space-ground cloud network integration capability system based on the hub port was proposed, and the phased evolution route of space-ground integrated communication operation of “business integration, user integration, terminal integration, cloud-network integration, and whole-system integration” was also proposed.Finally, the key technologies that need to be broken through were proposed in order to form the space-ground integrated communication operation ability, such as unified user authentication, multi-mode and multi-frequency intelligent terminal, network intelligent management, unified resource scheduling and so on.…”
    Get full text
    Article
  18. 658

    Conjunct model of cloud & client computing based on multi-agent by XU Xiao-long, CHENG Chun-ling, XIONG Jing-yi

    Published 2010-01-01
    “…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
    Get full text
    Article
  19. 659

    Control research and application of conventional operations without real-time networks by Zhengfeng ZHANG

    Published 2020-01-01
    “…On the basis of researching the timing agreement mechanism and mirror synchronization operation to ob-tain keys under the condition of no network,a logic control method was proposed based on cryptography control,non-real-time virtual communication and computing keys according to agreement,which could be well applied to dynamic authentication and switch operation of intelligent locks or switches without real-time communication net-work coverage.By using the intelligent terminal with the ability of agreed operation,a kind of “control network of cryptography” without real-time communication network was established,which could be used as a useful supple-ment to the IoT technology without communication coverage,as well as a remote object in a fixed location to transfer the right of management or use according to the order of calculation.By using the computing power of the terminal instead of the communication power of the remote end,without the need to build a backstage communication network and the communication expenses during the waiting period.…”
    Get full text
    Article
  20. 660

    Home Wi-Fi mesh networking technology by Longjie XU, Ning GUO, Tao GUO, Jianting HAN

    Published 2018-11-01
    “…Wi-Fi mesh is a kind of suitable for large or complex home wireless self-organizing network solution.It can provide users with full coverage,self-handoff and easy installation of high-quality wireless network.Wi-Fi mesh has many advantages,such as self-organizing,self-management,self-repair and self-balance.But the existing Wi-Fi mesh product implementation scheme is not uniform,complex,high terminal capability requirement and unable to interoperate.The realization of multi AP collaborative work in home network was firstly discussed,then the main current technology development of Wi-Fi mesh was analyzed,and the technical scheme and comparative analysis of home Wi-Fi mesh was focused on.Then,aiming at home application scenario,a Wi-Fi mesh technology implementation scheme for operators was presented,which was modularized,easy to realize,with low terminal capability requirement and good interoperability.…”
    Get full text
    Article