Showing 1,221 - 1,240 results of 2,763 for search '"The Terminator"', query time: 0.05s Refine Results
  1. 1221

    Optimization of TD-LTE shadow neighbor cells based on big data of road test by Zhechao ZHANG, Keke CHEN, Maojian LUO

    Published 2016-04-01
    “…CSFB has been adopted by many terminal manufacturers as one of the LTE voice solution. …”
    Get full text
    Article
  2. 1222

    Język w służbie walki ideologicznej i politycznej. Instrumentalizacja terminu islamofobia by Piotr Ślusarczyk

    Published 2021-08-01
    “…Łączy w sobie wkład z dziedzin nauk politologii religii, pragma­tyki językowej i komunikacji społecznej, aby udowodnić, że termin „islamofobia” używany w różnych kontek­stach jest pozbawiony wartości poznawczej ze względu na jego dwuznaczność, nierównowagę semantyczną i charakter pejoratywny. …”
    Get full text
    Article
  3. 1223

    RTRS algorithm in low-power Internet of things by Yuchen CHEN, Yuan CAO, Laipeng ZHANG, Lianghui DING, Feng YANG

    Published 2019-12-01
    “…Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.…”
    Get full text
    Article
  4. 1224

    A secure authentication method based on hash function for RFID system by Chuan LI, Xuejun LI

    Published 2017-06-01
    “…Limited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols,a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader,tags and server.Specifically,the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore,the proposed strategy effectively ensures the data and privacy security of the RFID system,achieving the bidirectional anonymous authentication between the terminal and server,which is very suitable for the distributed large-scale RFID system.…”
    Get full text
    Article
  5. 1225

    Research and design in dual network scheme of power corporation based on network isolation and secure data exchange by Jing WANG, Kunlun GAO, Bo ZHANG

    Published 2017-02-01
    “…It is a common concern for power enterprises of how to ensure the safety and stability of power production management and information network for group-oriented power generation enterprises.The dual-network architecture of group-type power generation enterprise was designed based on network isolation and the safe data exchange technology.Based on the protection of network security isolation,the private protocol interaction technology was introduced to meet the growing business development needs of power enterprises.The overall technical route of logical strong isolation was proposed,the design scheme of construction of information internal and external network,the application and deployment,and information exchange in typical application scenarios was put forward.In addition,in order to realize the centralized monitoring and unified protection after isolation,the design scheme of deploying unified monitoring,unified anti-virus,unified terminal management and unified authentication system was put forward.…”
    Get full text
    Article
  6. 1226

    Determining Sensor Locations in Wireless Sensor Networks by Zimao Li, Wenying Xiao

    Published 2015-08-01
    “…The problem is in fact the bottleneck Steiner tree problem, trying to find a Steiner tree minimizing the length of the longest edges for the given n terminals in the Euclidean plane by introducing at most k Steiner points. …”
    Get full text
    Article
  7. 1227

    5G beamforming weight optimization method based on particle swarm optimization algorithm by Jianbin WANG, Hengjun WANG, Song WU, Zhenkai WANG

    Published 2023-07-01
    “…In order to solve the problems of insufficient indoor 5G signal coverage and difficulty in optimization of high-rise buildings, the 5G beamforming weight optimization method based on particle swarm optimization (PSO) algorithm was proposed.Decoupling and reducing the network dimension into multiple subnet slices by collecting the data reported by the terminal, and the single cell weight database was planned and simulated to create the multi-cells weights group and fitness function.Finally, the PSO algorithm was adopted to obtain the local optimal weight group of the multi-cells.The test results show that the reference signal receiving power (RSRP) is improved by 8.7%, the signal to interference plus noise ratio (SINR) is improved by 17.5%, the downlink throughput is promoted by 27.3% together.The proposed method has the advantages of low cost, high efficiency and intelligence, and can significantly improve the user perception in high-rise buildings.…”
    Get full text
    Article
  8. 1228

    Spectrum access scheme of MAC layer for real-time traffic in cognitive radio network by Rui-fang LI, Quan LIU, Ren-fa LI

    Published 2014-04-01
    “…In channel access contention phase, the effect of channel conflict problem and deaf terminal problem in multichannel coordination can be reduced by designing channel access frame. …”
    Get full text
    Article
  9. 1229

    Research on 5G high-precision indoor positioning technology for smart parks by Baoyou WANG, Jingtao YANG, Saibin YAO, Haina YE, Zhihui WANG, Qiyuan ZHANG, Junfeng FU, Taishi JIN

    Published 2023-08-01
    “…The 5G cellular network not only provides wireless communication capabilities for terminals but also offers positioning functionalities.Firstly, the 3GPP 5G positioning technology was briefly outlined, followed by the proposal of the 5G indoor positioning technology road-map.The cloud-edge collaborative integrated positioning architecture, the 5G+X fusion positioning solution, as well as the 5G positioning solution for smart parks were included, with a detailed analysis of the architecture and process.These positioning solutions seamlessly addressed the issue of locating people or objects in areas where GNSS signals cannot reach, which could meet the positioning accuracy and timeliness requirements in different scenarios.The technology solution has been applied in the industry with meter-level positioning accuracy and second-level timeliness, which has been well evaluated by customers.…”
    Get full text
    Article
  10. 1230

    Signal and modulating role of enzymes of digestive glands by G. F. Korotko

    Published 2011-03-01
    “…Proteinases realize effects through protease-activated receptors of four types which are localized on membranes of glandular cells, leiomyocytes, sensory terminals of afferent neurons and neuroendocrine producers of regulatory peptides, yielding direct and mediated morphofunctional effects.Conclusion. …”
    Get full text
    Article
  11. 1231

    The Influence of the Load Type on the Center Frequency Tuning of the Variable-Flux Biaxial Energy Harvester by Karim El-Rayes, Salam Gabran, William Melek

    Published 2023-01-01
    “…The varying flux lines induce potential differences across the coil terminals. Unlike conventional VEHs, the center frequency of the VBH can be tuned by mechanical, electronic, or electromagnetic mechanisms to maximize the generated power. …”
    Get full text
    Article
  12. 1232

    Propagation and Production of Seacoast Marshelder by Mack Thetford, Debbie Miller

    Published 2004-12-01
    “…Flowers are not very showy, occur on terminal racemes with a bract below each flower, and have small lavender petals. …”
    Get full text
    Article
  13. 1233

    Morgue of the Misbegotten: O’Neill’s Pattern of Salvation in The Iceman Cometh by Mufeed F. Al-Abdullah

    Published 2007-04-01
    “…O’Neill’s savior, however, proves to be a parody of a savior, who alienates the misfortunate group instead of saving it.Hickey’s brand of salvation leads to death as a means of terminating human life and negating spiritual values. …”
    Get full text
    Article
  14. 1234

    Endonasal Surgery after Cocaine Abuse: Safe at Any Interval? by L. K. Døsen, R. Haye

    Published 2012-01-01
    “…Caution should be employed when considering surgery even in small perforations due to cocaine abuse even many years after the abuse was terminated.…”
    Get full text
    Article
  15. 1235

    Dynamic power control scheme based on fractional frequency reuse for D2D communication by Xianchao WANG, Fan JIANG, Changyin SUN, Chenbi LI, Binyan SHEN

    Published 2016-09-01
    “…By reusing the resource of existing cellular users,D2D (device-to-device)communication underlaying cellular network can improve the spectrum utilization rate and reduce the power consumption of mobile terminals.However,it will bring interference to the existing cellular networks.In order to ensure the quality of service of D2D users and cellular users,the power control and resource allocation scheme for D2D communication underlaying cellular communications was studied.Specifically,fractional frequency reuse was introduced to achieve the resource partitioning and resource reuse between cellular users and D2D users.Based on the principle of maximizing the throughput of the whole system,the optimization objective was established.Combined with the fractional power control and introduction of interference limits,a dynamic power control strategy was proposed.Simulation results show that the proposed scheme improves the performance of the overall system.…”
    Get full text
    Article
  16. 1236

    Channel estimation for hybrid intelligent reflecting surface structure assisted mmWave communications by Youhua FU, Dong CHEN

    Published 2021-10-01
    “…When adding intelligent reflecting surface (IRS) for assist communication in millimeter wave communication, the system becomes complicated and difficult to obtain channel state information (CSI).To solve these challenges, a hybrid intelligent reflecting surface structure was adopted, that is, the IRS was composed of a large number of passive elements and the limited radio frequency (RF) chains, where the limited RF chains were used to estimate the channel between the base station/terminal and the IRS.Based on the structure, a channel estimation scheme was proposed, which was based on the limited RF chains.First, an improved multiple signal classification algorithm was used to estimate the departure angle and arrival angle of the channel at the same time, and then a complex parallel deep neural network was proposed to estimate the path gain.Through simulation and comparison between the proposed scheme and other methods, the superiority of the proposed scheme is proved.…”
    Get full text
    Article
  17. 1237

    A survey of V2X security protection technologies by Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU

    Published 2023-03-01
    “…The vehicle-road-cloud collaborative V2X system has gradually become a national strategy, and the safety of V2X is related to driving security, life security, property security and even national security, which has increasingly become a hot spot for industry research.Firstly, the overall situation of the V2X security industry and the technology architecture of vehicle-road-cloud collaboration were introduced.Secondly, based on the “vehicle-road-cloud” technology system of V2X, the current status of domestic and international research was discussed, and the remaining problems and challenges in the field of V2X security protection were analyzed from three levels: V2X terminal security, roadside security and cloud security.Finally, the future development and research focus of the V2X security and protection technology were foreseen.…”
    Get full text
    Article
  18. 1238

    Research on VoNR voice wireless optimization strategy by Xinchao ZANG, Ronglin LI

    Published 2022-09-01
    “…There are two 5G voice solutions, EPS Fallback and VoNR.In the early stage of 5G network construction, 5G base station coverage rate and terminal penetration rate were not high, so EPS Fallback was used as a 5G voice transition solution.At present, with the deployment of 2.6 GHz and 700 MHz networks, the SA network achieves independent networking, and VoNR will be the main solution for 5G voice.In order to actively respond to the deployment of VoNR and analyze the advantages of VoNR from multiple dimensions, an in-depth research on VoNR features, parameters, and application scenarios were conducted, VoNR wireless strategy deployment was formulated, for uplink weak field, interference, large traffic characteristics of all kinds of scenarios functions such as deployment and optimization to provide suggestion and scheme, and prepares for VoNR’s official commercial use.…”
    Get full text
    Article
  19. 1239

    Access and Handover Authentication in Intermittent Connection Scenario of Satellite Network by Xiaoping SHI, Ruhui MA, Jin CAO, Hui LI, Lilan CHEN, Fenghua LI

    Published 2021-09-01
    “…This article disclosed an authentication method for access and handover in a low-orbit satellite network intermittent connection scenario.The scheme was based on a symmetrical cryptographic system.Based on hash function, XOR operation and timestamp, the safe access of the terminal to the satellite network was ensured.It reduced signaling overhead, bandwidth overhead, and computing overhead as well.In view of the link interruption, the solution was based on the current session key between the user and satellites to quickly and safely resume communication to ensured the quality of service.Through the orbit prediction technology, according to the current session key between the user and satellites and random number, the safe switching between satellites was realized, and the communication cost during the satellite switching process was reduced.The scheme realized the anonymity of user identity, and refreshed the temporary identity for the next authentication after successful authentication.…”
    Get full text
    Article
  20. 1240

    Recognition Code of ZNF191(243-368) and Its Interaction with DNA by Dongxin Zhao, Zhongxian Huang

    Published 2015-01-01
    “…ZNF191(243-368) is the C-terminal region of ZNF191 which contains a putative DNA-binding domain of four Cys2His2 zinc finger motifs. …”
    Get full text
    Article