Showing 1,121 - 1,140 results of 2,763 for search '"The Terminator"', query time: 0.07s Refine Results
  1. 1121

    A Fine-Grained Mobile Data Security Model by Yubin Yang, Liming Cheng

    Published 2014-01-01
    “…A kind of fine-grained security model for mobile data was proposed, tagged the mobile data and mobile applications in the intelligent terminal and the mobile access gateway/server, to control the operation of mobile data, and achieve the purpose of mobile data security isolation. …”
    Get full text
    Article
  2. 1122

    Research on Spectrum Access Mechanism Based on Polling Scheduling by Jin Lu, Ming Huang, Zhijun Yang

    Published 2013-11-01
    “…Based on the analysis method of embedded Markov chain and probability generating function, the key parameters of average queue length, bandwidth utilization and forced termination probability were obtained through solving the stationary distribution of equilibrium state. …”
    Get full text
    Article
  3. 1123

    Technical solution and application of 5G slicing private network based on cloud-network integration by Kai CHEN

    Published 2022-07-01
    “…Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.…”
    Get full text
    Article
  4. 1124

    Interference from IMT system to mobile satellite system in 1 518~1 525 MHz band by Rui HAN, Xiaoyan ZHANG, Chang LIU, Guan WANG

    Published 2016-03-01
    “…In order to analyze the feasibility of deploying mobile satellite system below 1 518~1 525 MHz band,the interference from the IMT system in 1 492~1 518 MHz band to the mobile satellite system in 1 518~1 525 MHz band was studied in detail via theoretical analysis and simulations based on the combing of the ITU recommendations and radio regulation.Aiming at the interference link from IMT base station to the terminal of mobile satellite system in different scenarios,the Monte Carlo simulation method was used to calculate the blocking and the adjacent channel interference.The interference blocking probability and the coexisting conditions between the two systems in adjacent band were given in the simulation results.The conclusion can be used to support the planning of adjacent band by national radio management department.…”
    Get full text
    Article
  5. 1125

    Cuba's Basic Units of Cooperative Production by José Alvarez

    Published 2004-09-01
    “… One of the most important policies of the 1990s was perhaps terminating the state monopoly on land to establish the Basic Units of Cooperative Production (Unidades Básicas de Producción Cooperativa, UBPCs) on those lands. …”
    Get full text
    Article
  6. 1126

    Pest Identification Guide: Melon Thrips, Thrips palmi Karny by Jeffrey D. Cluever, Hugh A. Smith

    Published 2016-06-01
    “…Leaf feeding can also cause terminal growth to be discolored, stunted, and malformed. …”
    Get full text
    Article
  7. 1127

    Security test of 101 protocol of FTU by Yong WANG, Xiang WANG, Wenting HE, Yuhao ZHOU, Yufan CAI

    Published 2018-10-01
    “…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
    Get full text
    Article
  8. 1128

    Measurement and analysis on channel large scale fading characteristics of conference room at 15 GHz by Jun SUN, Lijuan XIE, Hui XU, Shunshun LIU

    Published 2016-02-01
    “…Through changing azimuth angles in transmitting terminal in the measurement points,the relationship between received power and different angles were analyzed.…”
    Get full text
    Article
  9. 1129

    Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme by Rui SUN, You-Liang TIAN

    Published 2016-11-01
    “…In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.…”
    Get full text
    Article
  10. 1130

    L’Espagne et l’Europe communautaire : une vieille histoire de famille ? Du rêve d’union au mariage de raison by Isabelle Renaudet

    Published 2001-06-01
    “…This integration besides terminated a tradition of isolation, which kept Spain foreign to Europe for a long time. …”
    Get full text
    Article
  11. 1131

    Pest Identification Guide: Melon Thrips, Thrips palmi Karny by Jeffrey D. Cluever, Hugh A. Smith

    Published 2016-06-01
    “…Leaf feeding can also cause terminal growth to be discolored, stunted, and malformed. …”
    Get full text
    Article
  12. 1132

    VehLoc: an in-vehicle high-precision location method based on BLE multi-channel RSSI values by Ze ZHAO, Yuan GAO, Li CUI

    Published 2018-12-01
    “…By using a plurality of Bluetooth transmitters, the location of the receiving terminals in the vehicle was analyzed by combining the coarse, fine classifier and distribution fitting of the user's RSSI values in different channels. …”
    Get full text
    Article
  13. 1133

    Cuba's Basic Units of Cooperative Production by José Alvarez

    Published 2004-09-01
    “… One of the most important policies of the 1990s was perhaps terminating the state monopoly on land to establish the Basic Units of Cooperative Production (Unidades Básicas de Producción Cooperativa, UBPCs) on those lands. …”
    Get full text
    Article
  14. 1134

    Routing protocol based on energy aware in ad hoc networks by Shi ZHENG, Wei-qiang WU, Qin-yu ZHANG, Nai-tong ZHANG

    Published 2012-04-01
    “…An energy-aware routing protocol (EARP) was presented to minimize the effect of limit energy supply of terminals in ad hoc network.In the novel protocol,different transmission paths based on service state of single node and energy consumption of the whole network could be chosen.When transmission path was broken,local maintaining strategy was evoked to reduce re-transmission of data packets and therefore route efficiency was improved.Moreover,node energy levels were introduced to avoid transmission link brake caused by energy exhaustion.Simulations were carried out on NS2 platform.The results show that,in the same simulation environment,comparing to other routing protocols,this routing protocol performs more effectively on balancing the traffic load,protecting low energy nodes and prolonging the network lifetime.…”
    Get full text
    Article
  15. 1135

    Differentiated and negotiable mechanism for data communication by Wenlong KOU, Fenghua LI, Xiuze DONG, Xiaogang CAO, Kui GENG, Qing LI

    Published 2021-10-01
    “…In view of the massive and differentiated computing units and terminal devices in the cloud environment and the Internet of things, the differences in hardware resources and computing capabilities posed new challenges to high reliability and high performance data communication, a data communication mechanism supporting differentiation and negotiation was proposed.A parameters negotiation method was proposed, and parameters were negotiated by the sender according to the difference of the receiver capability to achieve differentiated and negotiable data communication.A retransmission feedback mechanism was designed, and the transmission rate was dynamically adjusted and the data was retransmitted based on the data reception feedback of the receiver by the sender to improve communication efficiency and reliability.The experimental results show that the proposed mechanism can perform dynamic adaptive, efficient and parallel communication according to the difference of the receiver capability.…”
    Get full text
    Article
  16. 1136

    Automated anomaly detection of IPTV user experience by Xiaomin TAN, Ai FANG, Duo JIN, Changjiang LI

    Published 2019-07-01
    “…Architecture of IPTV system is complex, involving a large number of terminals, network elements and connections. Therefore, a relatively complete monitoring system, which collected massive EPG experience data and formed multi-dimensional monitoring indicators, had been established to monitor user experience. …”
    Get full text
    Article
  17. 1137

    UAV-assisted MEC systems: architecture, key technology, and future challenges by Tiankui ZHANG, Yu XU, Yuanwei LIU, Dingcheng YANG, Yuanhong REN

    Published 2022-08-01
    “…With the fast deployment of 5G and the on-going development of 6G, unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) technology has significant advantages in the terms of overcoming the geographic restrictions, addressing the computational requirements of terminal devices, and enhancing the task offloading rate of the systems, which attracts wide attentions in academia and industry.The concept and the technique advantages of the UAV-assisted MEC systems were firstly clarified, and a general UAV-assisted MEC architecture was proposed, along with the definition of each function module.Then the classic application scenarios were summarized, and the existing key techniques were sorted out, based on which the design methods for the UAV-assisted MEC were achieved.Finally, the research directions and the potential challenges in the future were prospected and clarified.…”
    Get full text
    Article
  18. 1138

    NB-IoT network and service collaborative optimization by Bao GUO, IUYI L, Yang ZHANG

    Published 2018-11-01
    “…The preliminary construction of the NB-IoT network has been completed at this stage.The overall coverage is good,but there are more partial coverage holes,insufficient coverage of indoor difficult scenes,prominent interference problems and overlapping coverage.At present,the industry application of NB-IoT is low in maturity,and the application of the industry is in its infancy.Different terminal manufacturers have different specifications,which leads to major problems in the deployment process of network deployment.The NB-IoT network related indicators according to different business characteristics were analyzed,according to the main types of business of the internet of things.The coverage performance of such services was researched according to test data and statistical data.In-depth coverage analysis on the covers of manholes and poles was conducted.Overlapping coverage analysis gives an optimized solution to the business model with relatively concentrated service access.…”
    Get full text
    Article
  19. 1139

    Intelligent Analysis of Computer-Aided Garment Design CAD Based on Virtual Reality Model for Surplus Fabric Removal and Reuse without Segmentation of Cutting Pieces by Tanqiu Wang

    Published 2022-01-01
    “…Based on this structure, the computer analysis of garment design based on CAD can be connected at a deeper level, which will not only improve the design efficiency of new garments but also reduce the design time at the client terminal and enhance the quality of the design. Through the experimental operation of prototypes, it is verified that the intelligent system proposed in this paper can implement the design of prototypes quickly and effectively.…”
    Get full text
    Article
  20. 1140

    GABA Metabolism and Transport: Effects on Synaptic Efficacy by Fabian C. Roth, Andreas Draguhn

    Published 2012-01-01
    “…Here, we review findings on the availability of GABA for release at presynaptic terminals of interneurons. Presynaptic GABA content seems to be an important determinant of inhibitory efficacy and can be differentially regulated by changing synthesis, transport, and degradation of GABA or related molecules. …”
    Get full text
    Article