-
1121
A Fine-Grained Mobile Data Security Model
Published 2014-01-01“…A kind of fine-grained security model for mobile data was proposed, tagged the mobile data and mobile applications in the intelligent terminal and the mobile access gateway/server, to control the operation of mobile data, and achieve the purpose of mobile data security isolation. …”
Get full text
Article -
1122
Research on Spectrum Access Mechanism Based on Polling Scheduling
Published 2013-11-01“…Based on the analysis method of embedded Markov chain and probability generating function, the key parameters of average queue length, bandwidth utilization and forced termination probability were obtained through solving the stationary distribution of equilibrium state. …”
Get full text
Article -
1123
Technical solution and application of 5G slicing private network based on cloud-network integration
Published 2022-07-01“…Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.…”
Get full text
Article -
1124
Interference from IMT system to mobile satellite system in 1 518~1 525 MHz band
Published 2016-03-01“…In order to analyze the feasibility of deploying mobile satellite system below 1 518~1 525 MHz band,the interference from the IMT system in 1 492~1 518 MHz band to the mobile satellite system in 1 518~1 525 MHz band was studied in detail via theoretical analysis and simulations based on the combing of the ITU recommendations and radio regulation.Aiming at the interference link from IMT base station to the terminal of mobile satellite system in different scenarios,the Monte Carlo simulation method was used to calculate the blocking and the adjacent channel interference.The interference blocking probability and the coexisting conditions between the two systems in adjacent band were given in the simulation results.The conclusion can be used to support the planning of adjacent band by national radio management department.…”
Get full text
Article -
1125
Cuba's Basic Units of Cooperative Production
Published 2004-09-01“… One of the most important policies of the 1990s was perhaps terminating the state monopoly on land to establish the Basic Units of Cooperative Production (Unidades Básicas de Producción Cooperativa, UBPCs) on those lands. …”
Get full text
Article -
1126
Pest Identification Guide: Melon Thrips, Thrips palmi Karny
Published 2016-06-01“…Leaf feeding can also cause terminal growth to be discolored, stunted, and malformed. …”
Get full text
Article -
1127
Security test of 101 protocol of FTU
Published 2018-10-01“…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
Get full text
Article -
1128
Measurement and analysis on channel large scale fading characteristics of conference room at 15 GHz
Published 2016-02-01“…Through changing azimuth angles in transmitting terminal in the measurement points,the relationship between received power and different angles were analyzed.…”
Get full text
Article -
1129
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01“…In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.…”
Get full text
Article -
1130
L’Espagne et l’Europe communautaire : une vieille histoire de famille ? Du rêve d’union au mariage de raison
Published 2001-06-01“…This integration besides terminated a tradition of isolation, which kept Spain foreign to Europe for a long time. …”
Get full text
Article -
1131
Pest Identification Guide: Melon Thrips, Thrips palmi Karny
Published 2016-06-01“…Leaf feeding can also cause terminal growth to be discolored, stunted, and malformed. …”
Get full text
Article -
1132
VehLoc: an in-vehicle high-precision location method based on BLE multi-channel RSSI values
Published 2018-12-01“…By using a plurality of Bluetooth transmitters, the location of the receiving terminals in the vehicle was analyzed by combining the coarse, fine classifier and distribution fitting of the user's RSSI values in different channels. …”
Get full text
Article -
1133
Cuba's Basic Units of Cooperative Production
Published 2004-09-01“… One of the most important policies of the 1990s was perhaps terminating the state monopoly on land to establish the Basic Units of Cooperative Production (Unidades Básicas de Producción Cooperativa, UBPCs) on those lands. …”
Get full text
Article -
1134
Routing protocol based on energy aware in ad hoc networks
Published 2012-04-01“…An energy-aware routing protocol (EARP) was presented to minimize the effect of limit energy supply of terminals in ad hoc network.In the novel protocol,different transmission paths based on service state of single node and energy consumption of the whole network could be chosen.When transmission path was broken,local maintaining strategy was evoked to reduce re-transmission of data packets and therefore route efficiency was improved.Moreover,node energy levels were introduced to avoid transmission link brake caused by energy exhaustion.Simulations were carried out on NS2 platform.The results show that,in the same simulation environment,comparing to other routing protocols,this routing protocol performs more effectively on balancing the traffic load,protecting low energy nodes and prolonging the network lifetime.…”
Get full text
Article -
1135
Differentiated and negotiable mechanism for data communication
Published 2021-10-01“…In view of the massive and differentiated computing units and terminal devices in the cloud environment and the Internet of things, the differences in hardware resources and computing capabilities posed new challenges to high reliability and high performance data communication, a data communication mechanism supporting differentiation and negotiation was proposed.A parameters negotiation method was proposed, and parameters were negotiated by the sender according to the difference of the receiver capability to achieve differentiated and negotiable data communication.A retransmission feedback mechanism was designed, and the transmission rate was dynamically adjusted and the data was retransmitted based on the data reception feedback of the receiver by the sender to improve communication efficiency and reliability.The experimental results show that the proposed mechanism can perform dynamic adaptive, efficient and parallel communication according to the difference of the receiver capability.…”
Get full text
Article -
1136
Automated anomaly detection of IPTV user experience
Published 2019-07-01“…Architecture of IPTV system is complex, involving a large number of terminals, network elements and connections. Therefore, a relatively complete monitoring system, which collected massive EPG experience data and formed multi-dimensional monitoring indicators, had been established to monitor user experience. …”
Get full text
Article -
1137
UAV-assisted MEC systems: architecture, key technology, and future challenges
Published 2022-08-01“…With the fast deployment of 5G and the on-going development of 6G, unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) technology has significant advantages in the terms of overcoming the geographic restrictions, addressing the computational requirements of terminal devices, and enhancing the task offloading rate of the systems, which attracts wide attentions in academia and industry.The concept and the technique advantages of the UAV-assisted MEC systems were firstly clarified, and a general UAV-assisted MEC architecture was proposed, along with the definition of each function module.Then the classic application scenarios were summarized, and the existing key techniques were sorted out, based on which the design methods for the UAV-assisted MEC were achieved.Finally, the research directions and the potential challenges in the future were prospected and clarified.…”
Get full text
Article -
1138
NB-IoT network and service collaborative optimization
Published 2018-11-01“…The preliminary construction of the NB-IoT network has been completed at this stage.The overall coverage is good,but there are more partial coverage holes,insufficient coverage of indoor difficult scenes,prominent interference problems and overlapping coverage.At present,the industry application of NB-IoT is low in maturity,and the application of the industry is in its infancy.Different terminal manufacturers have different specifications,which leads to major problems in the deployment process of network deployment.The NB-IoT network related indicators according to different business characteristics were analyzed,according to the main types of business of the internet of things.The coverage performance of such services was researched according to test data and statistical data.In-depth coverage analysis on the covers of manholes and poles was conducted.Overlapping coverage analysis gives an optimized solution to the business model with relatively concentrated service access.…”
Get full text
Article -
1139
Intelligent Analysis of Computer-Aided Garment Design CAD Based on Virtual Reality Model for Surplus Fabric Removal and Reuse without Segmentation of Cutting Pieces
Published 2022-01-01“…Based on this structure, the computer analysis of garment design based on CAD can be connected at a deeper level, which will not only improve the design efficiency of new garments but also reduce the design time at the client terminal and enhance the quality of the design. Through the experimental operation of prototypes, it is verified that the intelligent system proposed in this paper can implement the design of prototypes quickly and effectively.…”
Get full text
Article -
1140
GABA Metabolism and Transport: Effects on Synaptic Efficacy
Published 2012-01-01“…Here, we review findings on the availability of GABA for release at presynaptic terminals of interneurons. Presynaptic GABA content seems to be an important determinant of inhibitory efficacy and can be differentially regulated by changing synthesis, transport, and degradation of GABA or related molecules. …”
Get full text
Article