Showing 101 - 120 results of 2,763 for search '"The Terminator"', query time: 0.06s Refine Results
  1. 101

    Finite-Time Terminal Sliding Mode Tracking Control for Piezoelectric Actuators by Jin Li, Liu Yang

    Published 2014-01-01
    “…This paper proposes a continuous finite-time control scheme using a new form of terminal sliding mode (TSM) combined with a sliding mode disturbance observer (SMDO). …”
    Get full text
    Article
  2. 102

    “Professional Qualities” of Players, Coaches and Termination of the just cause Employment Contract by A. A. Kashaeva

    Published 2020-09-01
    Subjects: “…grounds for termination of the employment contracts…”
    Get full text
    Article
  3. 103
  4. 104

    Design and Implementation of Android Mobile Terminals Monitoring System Based on SMS by Dalei Fan, Yong Wang

    Published 2014-12-01
    “…The Android mobile terminals monitoring system based on SMS was proposed and the function of getting information from the mobile phone with the monitoring system installed (remote Android mobile terminal)was implemented through the prearranged monitoring of it by short messages. …”
    Get full text
    Article
  5. 105

    Evidence of Presynaptic Localization and Function of the c-Jun N-Terminal Kinase by Silvia Biggi, Lucia Buccarello, Alessandra Sclip, Pellegrino Lippiello, Noemi Tonna, Cristiano Rumio, Daniele Di Marino, Maria Concetta Miniaci, Tiziana Borsello

    Published 2017-01-01
    “…The c-Jun N-terminal kinase (JNK) is part of a stress signalling pathway strongly activated by NMDA-stimulation and involved in synaptic plasticity. …”
    Get full text
    Article
  6. 106
  7. 107
  8. 108

    Rheokinetic Analysis of Hydroxy Terminated Polybutadiene Based Solid Propellant Slurry by Abhay K Mahanta, Monika Goyal, Devendra D Pathak

    Published 2010-01-01
    “…The cure kinetics of propellant slurry based on hydroxy-terminated polybutadiene (HTPB) and toluene diisocyanate (TDI) polyurethane reaction has been studied by viscosity build up method. …”
    Get full text
    Article
  9. 109

    Terminal Guidance Law for UAV Based on Receding Horizon Control Strategy by Zhenglong Wu, Zhenyu Guan, Chengwei Yang, Jie Li

    Published 2017-01-01
    “…Terminal guidance law against the maneuvering target is always the focal point. …”
    Get full text
    Article
  10. 110

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  11. 111
  12. 112

    Termination-acidity tailoring of molybdenum carbides for alkaline hydrogen evolution reaction by Zhigang Chen, Minghao Yang, Yifan Li, Wenbin Gong, Juan Wang, Tong Liu, Chunyu Zhang, Shuang Hou, Guang Yang, Hao Li, Ye Jin, Chunyan Zhang, Zhongqing Tian, Fancheng Meng, Yi Cui

    Published 2025-01-01
    “…Our work paves an interesting termination-acidity-tailoring strategy to explore cost-effective catalysts towards water electrolysis and beyond.…”
    Get full text
    Article
  13. 113
  14. 114
  15. 115
  16. 116

    Single password authentication method for remote user based on mobile terminal assistance by Yuan XU, Chao YANG, Li YANG

    Published 2019-02-01
    Subjects: “…authentication based on mobile terminal…”
    Get full text
    Article
  17. 117

    Research on trust measurement method for initial access of industrial internet edge terminals by Ya YU, Yusun FU

    Published 2022-12-01
    “…The development of the discrete manufacturing shows a trend of intelligence, openness and collaboration.As a result, many heterogeneous devices are connected to the industrial internet, which brings serious challenges to the security.Therefore, it is particularly important to introduce trust management and trusted access to devices for trusted measurement.In order to more timely and accurately evaluate the trustworthiness of the edge terminal initially accessing the system, a trustworthiness measurement method based on the device vulnerability database was innovatively proposed.This method adopted the architecture of cloud-edge collaboration, established a device information database and a vulnerability database in the central cloud, and then calculated the terminal risk factor at the edge.Finally, the trust initialization of the access terminal was completed.The simulation results show that the method can well balance the efficiency and security of the system.…”
    Get full text
    Article
  18. 118

    Privacy-preserving attribute ticket scheme based on mobile terminal with smart card by Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG

    Published 2022-10-01
    “…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
    Get full text
    Article
  19. 119

    Macroscopic Model and Simulation Analysis of Air Traffic Flow in Airport Terminal Area by Honghai Zhang, Yan Xu, Lei Yang, Hao Liu

    Published 2014-01-01
    “…We focus on the spatiotemporal characteristics and their evolvement law of the air traffic flow in airport terminal area to provide scientific basis for optimizing flight control processes and alleviating severe air traffic conditions. …”
    Get full text
    Article
  20. 120

    Time Domain Response of Uniform RC Lines with RC Termination at Both Ends by Muhammad Taher Abuelma'atti

    Published 1997-01-01
    “…The time domain response of uniform RC lines with RC termination at both ends is obtained from the approximate poles of the transfer function. …”
    Get full text
    Article