-
101
Finite-Time Terminal Sliding Mode Tracking Control for Piezoelectric Actuators
Published 2014-01-01“…This paper proposes a continuous finite-time control scheme using a new form of terminal sliding mode (TSM) combined with a sliding mode disturbance observer (SMDO). …”
Get full text
Article -
102
“Professional Qualities” of Players, Coaches and Termination of the just cause Employment Contract
Published 2020-09-01Subjects: “…grounds for termination of the employment contracts…”
Get full text
Article -
103
Representation and termination analysis for ECA rules based on extended Petri net
Published 2013-03-01Subjects: Get full text
Article -
104
Design and Implementation of Android Mobile Terminals Monitoring System Based on SMS
Published 2014-12-01“…The Android mobile terminals monitoring system based on SMS was proposed and the function of getting information from the mobile phone with the monitoring system installed (remote Android mobile terminal)was implemented through the prearranged monitoring of it by short messages. …”
Get full text
Article -
105
Evidence of Presynaptic Localization and Function of the c-Jun N-Terminal Kinase
Published 2017-01-01“…The c-Jun N-terminal kinase (JNK) is part of a stress signalling pathway strongly activated by NMDA-stimulation and involved in synaptic plasticity. …”
Get full text
Article -
106
Issues of identity verification of typical applications over mobile terminal platform
Published 2020-12-01Get full text
Article -
107
Design of campus network terminal positioning system based on topology discovery
Published 2024-11-01Subjects: Get full text
Article -
108
Rheokinetic Analysis of Hydroxy Terminated Polybutadiene Based Solid Propellant Slurry
Published 2010-01-01“…The cure kinetics of propellant slurry based on hydroxy-terminated polybutadiene (HTPB) and toluene diisocyanate (TDI) polyurethane reaction has been studied by viscosity build up method. …”
Get full text
Article -
109
Terminal Guidance Law for UAV Based on Receding Horizon Control Strategy
Published 2017-01-01“…Terminal guidance law against the maneuvering target is always the focal point. …”
Get full text
Article -
110
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
111
Terminal value problem for the system of fractional differential equations with additional restrictions
Published 2025-01-01Subjects: “…terminal value problem…”
Get full text
Article -
112
Termination-acidity tailoring of molybdenum carbides for alkaline hydrogen evolution reaction
Published 2025-01-01“…Our work paves an interesting termination-acidity-tailoring strategy to explore cost-effective catalysts towards water electrolysis and beyond.…”
Get full text
Article -
113
Study on the Assessment Model of Video Communication Quality Based on Smart Terminal
Published 2013-04-01Subjects: Get full text
Article -
114
Terminals behavior testing research under IPv6 Wi-Fi
Published 2014-10-01Subjects: Get full text
Article -
115
USERS’ SATISFACTION WITH INTERCITY BUS TERMINAL QUALITY IN LAGOS STATE, NIGERIA
Published 2024-06-01Subjects: “…bus terminal quality…”
Get full text
Article -
116
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: “…authentication based on mobile terminal…”
Get full text
Article -
117
Research on trust measurement method for initial access of industrial internet edge terminals
Published 2022-12-01“…The development of the discrete manufacturing shows a trend of intelligence, openness and collaboration.As a result, many heterogeneous devices are connected to the industrial internet, which brings serious challenges to the security.Therefore, it is particularly important to introduce trust management and trusted access to devices for trusted measurement.In order to more timely and accurately evaluate the trustworthiness of the edge terminal initially accessing the system, a trustworthiness measurement method based on the device vulnerability database was innovatively proposed.This method adopted the architecture of cloud-edge collaboration, established a device information database and a vulnerability database in the central cloud, and then calculated the terminal risk factor at the edge.Finally, the trust initialization of the access terminal was completed.The simulation results show that the method can well balance the efficiency and security of the system.…”
Get full text
Article -
118
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
Published 2022-10-01“…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
Get full text
Article -
119
Macroscopic Model and Simulation Analysis of Air Traffic Flow in Airport Terminal Area
Published 2014-01-01“…We focus on the spatiotemporal characteristics and their evolvement law of the air traffic flow in airport terminal area to provide scientific basis for optimizing flight control processes and alleviating severe air traffic conditions. …”
Get full text
Article -
120
Time Domain Response of Uniform RC Lines with RC Termination at Both Ends
Published 1997-01-01“…The time domain response of uniform RC lines with RC termination at both ends is obtained from the approximate poles of the transfer function. …”
Get full text
Article