Showing 1,521 - 1,540 results of 2,763 for search '"The Terminator"', query time: 0.06s Refine Results
  1. 1521

    Dissolved State and Identity in John Maxwell Coetzee’s Life and Times of Michael K within the scope of the Postcolonial Other by İsmail Avcu

    Published 2022-10-01
    “…Regardless of the situation, human rights are expected to be maintained and safeguarded and it can be inferred from this that such rights are automatically terminated in times of war. Michael K’s futile attempts to obtain travel documents to Cape Town lawfully serve as an example of how much people rely on the efficient operation of all governmental institutions, while his entire life demonstrates the significance of personal freedom and freedom of movement. …”
    Get full text
    Article
  2. 1522

    Miniaturized Wide Scanning Angle Phased Array Using EBG Structure for 5G Applications by Xiumei Shen, Kun Xue, Xinggang Tang, Yuqi He

    Published 2022-01-01
    “…This proposed method enabling the array to be compact and wide in scanning angle is very attractive for 5G mobile terminal applications.…”
    Get full text
    Article
  3. 1523

    Observation and Numerical Simulation of Terrain-Induced Windshear at the Hong Kong International Airport in a Planetary Boundary Layer without Temperature Inversions by P. W. Chan, K. K. Hon

    Published 2016-01-01
    “…Such windshear occurring in a planetary boundary layer without temperature inversions is studied in this paper by using the data from the Terminal Doppler Weather Radar and Light Detection and Ranging systems. …”
    Get full text
    Article
  4. 1524

    Secure and collaborative spectrum sensing scheme based on audit game by Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN

    Published 2023-12-01
    “…To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.…”
    Get full text
    Article
  5. 1525

    Design and implementation of mobile video service quality analysis system by Gang ZHAO

    Published 2017-07-01
    “…Customer perception of mobile video service not only depends on the quality of the network,but also depends on the role of “end,pipeline,cloud,platform”.It is urgent to change the quality assurance mechanism based on the network itself to the end-to-end horizontal integration of customer perception.To solve these problems,the design and implementation of a mobile video service quality analysis system was introduced.The analysis model was established from service,flow direction,area,network element,community and terminal in order to analyze the data source in each part of the mobile video service; key KQI and changing trend of video services was presented,constant performance monitoring was carried out; the problem was found from the users’ perspective,trend analysis of performance deterioration,cause analysis of performance deterioration; automatic or manual processing of the identified problems by distribution work order was carried out,the problems were solved by antomatically or manual dispatch,closed-loop management mechanism was established.This system could improve the management level of mobile video service quality and reduce the cost notably significantly.The framework of the system and the realization of main function part was introduced in detail,and examples of system applications were described.…”
    Get full text
    Article
  6. 1526

    Application and development of Internet of things in medical service by Zhibiao WANG, Peng RAN, Qiao CHEN

    Published 2018-09-01
    “…With the continuous development of information technology,such technologies as the Internet of things,sensors,mobile terminals and big data are being fully used in medical services.Intelligent medical care has also become a new goal of hospital information construction.The emergence and development of Internet of things technology were analyzed,the importance of this technology in the field of medical and health construction were summarized,which helped to improve the efficiency and quality of medical process services,improved the level of comprehensive hospital management.Two aspects were mainly elaborated:one was the intelligent medical system based on the Internet of things,which provided medical and health interactive services to users,and promoted the transformation of disease from therapeutic intervention to preventive intervention; the other was the intelligent medical system based on the Internet of things,promoted cloud computing and real-time transmission and sharing of large data in medical information.The application of this technology improved the utilization of medical resourced,reduced the cost of medical treatment,and changed the traditional mode of medical treatment.It is foreseeable that intelligent medical services based on Internet of things will become an indispensable part of people’s healthy life.…”
    Get full text
    Article
  7. 1527

    An Update on the Controversies in Anemia Management in Chronic Kidney Disease: Lessons Learned and Lost by Geoffrey Teehan, Robert L. Benz

    Published 2011-01-01
    “…CHOIR (N=1432) was terminated early with more frequent death and cardiovascular outcomes in the higher Hb group (HR 1.34: 95% C.I. 1.03–1.74, P=.03). …”
    Get full text
    Article
  8. 1528

    Research on Direct Braking Force Estimation and Control Strategy Using Tire Inverse Model by Zhiguo Zhou, Xiaoning Zhu

    Published 2022-01-01
    “…A direct braking force antilock braking system (DBF-ABS) controller is built using the nonsingular fast terminal sliding mode method. The simulation results indicated that the control strategy has adaptability and stability to the change of road conditions.…”
    Get full text
    Article
  9. 1529

    ASSESSING THE SYNERGETIC EFFECT OF SELECTING THE OPTIMAL STRUCTURE OF A LOGISTICS CHAIN by Vitalii NAUMOV, Ihor TARAN, Zhumazhan ZHANBIROV, Batyrbek MUSSABAYEV, Zarina KONAKBAI

    Published 2024-09-01
    “…These stakeholders include freight owners, who initiate the delivery process, forwarders who manage and optimize deliveries, carriers who physically transport goods, and freight terminals that facilitate cargo handling and storage. …”
    Get full text
    Article
  10. 1530

    Investigation and Validation of Mission Evaluation Models for Space Close-Range Inspection by Jianyong Zhou, Zhipu Hou, Kebo Li

    Published 2024-01-01
    “…The effectiveness evaluation of space inspection tasks will significantly affect the studies on the trajectory design, orbit motion control, and task termination conditions. However, the evaluation models in previous studies are too simple such as that they are usually without considering dynamic changes in the satellite orbit relative motion. …”
    Get full text
    Article
  11. 1531

    Interaction Design of Educational App Based on Collaborative Filtering Recommendation by Ying Xu, Tse-Kian Neo, Hin Hew Soon

    Published 2022-01-01
    “…Due to the operational characteristics of gesture interaction in the interface of a smart terminal application (app), this mode of human-computer interaction has become the mainstream mode of human-computer interaction. …”
    Get full text
    Article
  12. 1532

    Computing Resource Allocation Strategy Using Biological Evolutionary Algorithm in UAV-Assisted Mobile Edge Computing by Li Wang, Xiang Yao, Zhenqi Yuan

    Published 2022-01-01
    “…On the basis of data encoding, crossover, mutation, and termination operations, the optimization performance of algorithm is greatly improved by multiple iterations of fitness function. …”
    Get full text
    Article
  13. 1533

    Course Recommendations in Online Education Based on Collaborative Filtering Recommendation Algorithm by Jing Li, Zhou Ye

    Published 2020-01-01
    “…The server-side development adopts a mature B/S architecture and the popular development model, while the mobile terminal uses HTML5 and framework to implement the function of recommending personalized courses for users using collaborative filtering and recommendation algorithms. …”
    Get full text
    Article
  14. 1534

    Efficient secure federated learning aggregation framework based on homomorphic encryption by Shengxing YU, Zhong CHEN

    Published 2023-01-01
    “…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
    Get full text
    Article
  15. 1535

    Abelia x grandiflora 'Edward Goucher' by Edward F. Gilman

    Published 2004-10-01
    “…Reaching a height of 6 to 10 feet with a spread of 6 feet, the gently rounded form of glossy abelia is clothed from spring through fall with terminal clusters of delicate pink and white, small, tubular flowers. …”
    Get full text
    Article
  16. 1536

    Diagnosis of feline infectious peritonitis by immunohistochemistry and histopathology methods: a case report based on diagnostic approach by Mehmet Burak Ateş, Gökhan Akçakavak, Zeynep Çelik, Özgür Özdemir

    Published 2021-03-01
    “…It was concluded that this case of FIP, when all findings are evaluated together, may have started as a dry form, and turned into a wet form in the terminal period.…”
    Get full text
    Article
  17. 1537

    Throughput optimization of multi-hop and multi-path cooperation in WPSNs with hardware noises by Lina Yuan, Huajun Chen, Jing Gong

    Published 2021-06-01
    “…This paper proposes a novel multi-path and multi-hop wireless powered sensor network in case of hardware impairment, constituting an energy node, one source node, single sink node, and a series of distributed relay sensor nodes, where the energy node transmits wireless energy to all terminals in the first stage, and the relay sensor nodes relay the information of the source node to the sink node in the second stage. …”
    Get full text
    Article
  18. 1538

    Biochemical analysis to study wild-type and polyglutamine-expanded ATXN3 species. by Grégoire Quinet, María Cristina Paz-Cabrera, Raimundo Freire

    Published 2024-01-01
    “…The main hallmark of SCA3 is the expansion of a polyglutamine tract located in the C-terminal of Ataxin-3 (or ATXN3) protein, that triggers the mis-localization and toxic aggregation of ATXN3 in neuronal cells. …”
    Get full text
    Article
  19. 1539

    Optimizing Generative Design for Cam Curve Through NURBS Approach based on Objective Constraint by Li Linwen, Lu Bo, Xiao Yang, Zhao Zhe

    Published 2016-01-01
    “…The results yield to a generative motion that satisfy the prescribed terminal conditions that include performance criteria related to kinematic,geometry,pressure angle as well as undercutting property of the system. …”
    Get full text
    Article
  20. 1540

    Retracted: Cloud Network and Mathematical Model Calculation Scheme for Dynamic Big Data by Yiren Chen, Zhiyong Qiu

    Published 2020-01-01
    “…After analysis, the obtained results are actively cached on the fog computing device and compared with the data of the telecommunication network detection terminal on the fog device. To consider the final result. …”
    Get full text
    Article