Showing 881 - 900 results of 2,763 for search '"The Terminator"', query time: 0.09s Refine Results
  1. 881

    Wireless VPN network structure and safety protection in the north and south call center of SGCC by Ying ZOU, Yirong WANG, Yanru WANG, Sining WANG

    Published 2016-02-01
    “…Through the research on wireless virtual private network security from the four aspects as the terminal,network,boundary and application,reference for the design and construction of the center wireless virtual private network was provided.…”
    Get full text
    Article
  2. 882

    Aberrant Presentation of Canalis Sinuosus: A Rare Case Report by Akshay Agarwal, Preeti P Nair, Ganiga Channaiah Shivakumar, Annette Bhambal

    Published 2024-12-01
    “…The intraosseous path of the anterior superior alveolar nerve (ASAN) and vessels known as canalis sinuosus (CS) can present as a tortuous channel along the infraorbital region and walls of maxillary sinus. This usually terminates in the anterior maxilla in the palatal region through small accessory foramina. …”
    Get full text
    Article
  3. 883

    Design on Cloud Computing Application Platform Based on CDMA VPDN by Min Cai

    Published 2013-09-01
    “…Under the design principles of mobile integration, the terminal was installed on client edge to establish express IPSec tunnels for accessing the platform. …”
    Get full text
    Article
  4. 884

    Low Profile, Dual-Polarised Antenna for Aeronautical and Land Mobile Satcom by Martin Shelley, Robert Pearson, Javier Vazquez

    Published 2009-01-01
    “…High data rate communications on the move is fastly becoming a major application area for satellite systems using Ku- and higher frequency bands. The ground terminal antenna used in such systems has a profound impact on the system capabilities and is constrained in many often conflicting ways. …”
    Get full text
    Article
  5. 885

    Research on cloud storage systems supporting secure sharing by Yan SONG, Zhen HAN, Jian-jun LI, Lei HAN

    Published 2017-10-01
    “…A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.…”
    Get full text
    Article
  6. 886

    Application of high-performance 4K live broadcast service in 5G network by Yizhi DING, Ziyu XIAO, Shaoping LI, Hongwei LV, Yingxia NIU

    Published 2019-06-01
    “…In order to accelerate the industrialization and commercialization of 5G and promote the integration and innovation development of 5G with various industries,the operators launched the demonstration project of 5G business application.The typical business scenarios under 5G network was firstly analyzed,the architecture of system was described,then hardware scheme was given including 4K collector,cloud platform and broadcast terminal.Then software solutions were proposed including management platform,cloud fast encoding system,4K transcoding platform,CDN and network slicing.…”
    Get full text
    Article
  7. 887

    Security in cognitive radio networks by Qing-qi PEI, Hong-ning LI, Hong-yang ZHAO, Nan LI, Ying MIN

    Published 2013-01-01
    “…Cognitive radio can obtain and access spectrum white holes without interfering primary users by sensing wireless environment to meet with the more spectrum requirement of users and improve spectrum utilization.However,it also brings new secure challenges that different from traditional wireless networks.Relying cognition cycle,the security issues in cognitive radio networks are presented from data channel,control channel and terminal equipment,then the existing defensive measures and propose the secure recommendations of cognitive radio networks are introduced.…”
    Get full text
    Article
  8. 888

    Anaplastic Transformation of Papillary Thyroid Cancer in the Retroperitoneum by James P. Solomon, Fang Wen, Lily J. Jih

    Published 2015-01-01
    “…Anaplastic thyroid carcinoma is an aggressive variant of thyroid cancer that in most cases arises from anaplastic transformation of terminally differentiated thyroid carcinomas. This process usually occurs in the thyroid or cervical lymph nodes. …”
    Get full text
    Article
  9. 889

    Research on external service capability of 5G industry private network by Shuai WANG, Dan CHEN, Yu XIAO

    Published 2022-05-01
    “…Based on industry demand and operator private network model, the overall structure of the external service capability platform, innovative UPF network management data direct acquisition plan was proposed.The platform's industry-oriented terminal management and network management, business management and network capability opening was introduced.Taking the business simulation dialing function as an example, the combination of the external service capability of the private network and the industry business was deeply discussed.The research results will help promote the deeper integration of 5G and the industry.…”
    Get full text
    Article
  10. 890

    Mobility management of the 6G satellite IoT:challenges and key techniques by Weigang BAI, Min SHENG, Panpan DU

    Published 2020-03-01
    “…The satellite Internet of things (SIoT) is regarded as a feasible scheme to realize the vision of the “ubiquitous connection” in 6G.The relatively high-speed movement between the mobile satellite and the terminal causes service continuity problems.The mobility management technology of the SIoT was expounded.New challenges to the mobility management of the SIoT caused by the dual-mobility,wide-area coverage and non-uniform demand were analyzed.Key techniques of the mobility management of the SIoT in 6G from aspects of the mobility management architecture,prediction and enhancement were discussed.…”
    Get full text
    Article
  11. 891

    Network Design and Route Analysis Using Outside Plant by Isaac Adjaye Aboagye, Nii Longdon Sowah, Wiafe Owusu-Banahene, Aryee Shaelijah, Margaret Ansah Richardson, Emmanuel Baah-Boadi

    Published 2025-01-01
    “…Individual components in the OSP architecture contributed to fixed losses of 0.7, 10.5, and 10.6 in the optical line terminal (OLT), FDT, and fiber access terminal (FAT), respectively. …”
    Get full text
    Article
  12. 892

    Spatiotemporal Distribution Characteristics of Mesoscale Convective Systems Producing Short-Duration Heavy Rainfall over the Tianshan Mountain Area by Jiangang Li, Lianmei Yang, Wen Liu, Cailian Jiang

    Published 2019-01-01
    “…The development and termination stages of MCSs lasted 3∼6 h and 2∼7 h, respectively. …”
    Get full text
    Article
  13. 893

    A procedure for dual simple t-cannulation in the small intestine of pigs using a single right flank laparotomy by A.L. Petry, S.A. Gould, J.F. Patience

    Published 2020-11-01
    “…Each gilt was equipped with a simple t-cannula in the terminal ileum, approximately 10 cm cranial to the ileocecal valve, and a second t-cannula in the jejunum 240 cm distal from where the duodenum is visually posterior to the transverse colon. …”
    Get full text
    Article
  14. 894

    Structural basis for the interaction between the Drosophila RTK Sevenless (dROS1) and the GPCR BOSS by Jianan Zhang, Yuko Tsutsui, Hengyi Li, Tongqing Li, Yueyue Wang, Salma Laraki, Sofia Alarcon-Frias, Steven E. Stayrook, Daryl E. Klein

    Published 2025-01-01
    “…We show that the extracellular region of dROS1 adopts a folded-over conformation stabilized by an N-terminal domain comprised of two disulfide stapled helical hairpins. …”
    Get full text
    Article
  15. 895

    Transient degradation of NF-κB proteins in macrophages after interaction with mast cell granules by Noriko Ito, Yuai Li, Tsuneo Suzuki, Daniel J. Stechschulte, Kottarappat N. Dileepan

    Published 1998-01-01
    “…These data indicate that exposure of J774 cells to MCG leads to generation of altered nuclear p52, p65 and c-Rel, which retain intact N-terminal peptides, specific oligonucleotide binding and transactivating activity. …”
    Get full text
    Article
  16. 896

    Transcriptional Activity of PGC-1α and NT-PGC-1α Is Differentially Regulated by Twist-1 in Brown Fat Metabolism by Hee-Jin Jun, Thomas W. Gettys, Ji Suk Chang

    Published 2012-01-01
    “…The inhibition of PGC-1α activity by Twist-1 is mediated by direct interaction through the C-terminal region of PGC-1α (aa 353–797). Thus, the absence of the corresponding C-terminal domain in NT-PGC-1α allows NT-PGC-1α to be free from Twist-1-mediated inhibition. …”
    Get full text
    Article
  17. 897

    Optimization Configuration Model for Intelligent Measurement Multi-Core Modules Considering “Cloud-Edge-End-Core” Collaboration by Lai Zhou, Qinhao Li, Guoying Lin

    Published 2025-01-01
    “…The decision variables include the core chip level of the intelligent measurement terminal, the management core chip level for smart meters, and the placement of application configurations. …”
    Get full text
    Article
  18. 898

    Characterization of novel human endogenous retrovirus structures on chromosomes 6 and 7 by Nicholas Pasternack, Nicholas Pasternack, Ole Paulsen, Avindra Nath

    Published 2025-01-01
    “…While the reference genome for both regions suggests these two loci are structurally dissimilar, we found that for both loci about 5% of individuals have a unique tandem repeat-like sequence (three long terminal repeat sequences sandwiching two internal, potentially protein coding sequences), while most individuals have a standard proviral structure (one internal region sandwiched by two long terminal repeats). …”
    Get full text
    Article
  19. 899

    Immunoinformatics Approach to Design a Chimeric CD70-Peptide Vaccine against Renal Cell Carcinoma by Haideh Namdari, Farhad Rezaei, Fatemeh Heidarnejad, Mohammad Yaghoubzad-Maleki, Maryam Karamigolbaghi

    Published 2024-01-01
    “…To enhance immunogenicity, sequences of cell-penetrating peptide (CPP), penetratin (pAntp), along with the entire sequence of tumor necrosis factor-α (TNF-α), were attached to the N-terminal and C-terminal of the CD70 epitopes. Computational assessments were performed on these chimeric vaccines for antigenicity, allergenicity, peptide toxicity, population coverage, and physicochemical properties. …”
    Get full text
    Article
  20. 900

    The Role of E-Cadherin in the Assessment of Esophageal Mucosal Damage in Patients with Gastroesophageal Reflux Disease Associated with Obstructive Sleep Apnea/Hypopnea Syndrome by Y. Ya. Shaukovich

    Published 2019-06-01
    “…There were no statistically significant differences in the plasma level of the N-terminal E-cadherin fragment between GERD patients and the comparison group (0.207 (0.128; 0.295) and 0.128 (0.067; 0.281) ng/ml, respectively, p = 0.082). …”
    Get full text
    Article