Showing 141 - 160 results of 2,763 for search '"The Terminator"', query time: 0.08s Refine Results
  1. 141

    Estimation and compensation for transmitter and receiver I/Q imbalance of full-duplex terminals by Hao-wei WU, Jun-bo ZHAO, Hao-ran XU, Jing-lan OU

    Published 2017-01-01
    “…In order to reduce I/Q imbalance of the full-duplex terminal with direct-conversion transceiver,an algorithm based on self-interference signal was proposed for the estimation and compensation of I/Q imbalance in both transmitter (Tx) and receiver (Rx).Without the perfect transmitter or receiver for I/Q imbalance estimation,the self-interference signal from Tx chain to Rx chain was used for parameter estimation and separation,and the Tx and Rx I/Q imbalance parameters were obtained,respectively.Then the pre-compensation before transmission and the correction after receiving was processed,so that there was nearly no I/Q imbalance in this full-duplex terminal from the view of the other terminals,and the complexity of the signal processing will be reduced as a result of the absent of the I/Q imbalance estimation.The simulation results show that the proposed algorithm can effectively estimate and compensate the I/Q imbalance of the full-duplex Tx & Rx terminal,and improve the overall signal quality and the system performance.…”
    Get full text
    Article
  2. 142

    Neural Terminal Sliding-Mode Control for Uncertain Systems with Building Structure Vibration by Jianhui Wang, Wenli Chen, Zicong Chen, Yunchang Huang, Xing Huang, Wenqiang Wu, Biaotao He, Chunliang Zhang

    Published 2019-01-01
    “…To address this problem, a neural terminal sliding-mode control method is proposed. The proposed method is combined with a terminal sliding-mode and a hyperbolic tangent function to ensure that the considered system can be stabilized in finite-time without chattering. …”
    Get full text
    Article
  3. 143

    Networking model and traffic analysis for integrating ad hoc and LEO satellite terminals by WANG Xiao-yan, WANG Hao, DONG Yan, HUANG Zai-lu

    Published 2006-01-01
    “…The compromise between the utilization rate of valuable satellite channels and the blocking probability of new call was hardly to achieve.Enlightened by the advantages of ad hoc networking,a new scheme was proposed which al-lowed the terminals to work in alternative mode according the instructions from the satellite’s signaling channel,meaned to communicate with other terminals in ad hoc mode when they were in a distance shorter than the maximum ad hoc communication distance and when the system was in busy state or in normal satellite communication mode when the system was idle.So the overflow traffic in nearer distance might get serviced with ad hoc mode and the system’s parame-ters was improved.Simulation results show that the proposed scheme has decreased the realistic call blocking probability and increased the valid channel utility rate of the system.…”
    Get full text
    Article
  4. 144
  5. 145

    Efficacy of laparoscopic cardiectomy combined with side overlap anastomosis for the treatment of terminal achalasia by Jing-Tao Wang, Yu-Xiang Sun, Rui-Xin Li, Yun-Fei Zhang, Heng-Xuan Ding, Guo-Jun Wang, Bu-Lang Gao

    Published 2025-01-01
    “…Abstract To investigate the safety and short-term effectiveness of laparoscopic-assisted cardiectomy with side-overlap esophagogastric reconstruction for the treatment of terminal or end-stage achalasia, patients with end-stage achalasia treated with laparoscopic-assisted cardiectomy with side-overlap esophagogastric reconstruction were retrospectively enrolled. …”
    Get full text
    Article
  6. 146
  7. 147
  8. 148

    Scheduling Optimization for Twin ASC in an Automated Container Terminal Based on Graph Theory by Yifeng Xu, Jin Zhu

    Published 2022-01-01
    “…Aiming at the twin automated stacking cranes (ASCs) scheduling problem in a single block of an automated container terminal, resolving conflicts between ASCs is an important point that needs to be considered. …”
    Get full text
    Article
  9. 149

    Research on location privacy protection of mobile terminals for maritime monitoring sensor networks by Xin SU, Su JIANG, Yiqing ZHOU

    Published 2021-12-01
    “…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
    Get full text
    Article
  10. 150

    Impact of Stochastically Perturbed Terminal Velocities on Convective-Scale Ensemble Forecasts of Precipitation by Shizhang Wang, Xiaoshi Qiao, Jinzhong Min

    Published 2020-01-01
    “…An idealized supercell storm case was first used to determine the terminal velocity error characteristics for a one-moment microphysics scheme in terms of the terminal velocities from a two-moment scheme. …”
    Get full text
    Article
  11. 151
  12. 152

    Critical Literature Review into Planning of Inter-Terminal Transport: In Port Areas and the Hinterland by Qu Hu, Bart Wiegmans, Francesco Corman, Gabriel Lodewijks

    Published 2019-01-01
    “…Nowadays, the major ports around the world usually consist of multiple terminals and service centers which are often run by different operators. …”
    Get full text
    Article
  13. 153

    Neural Network Assisted Inverse Dynamic Guidance for Terminally Constrained Entry Flight by Hao Zhou, Tawfiqur Rahman, Wanchun Chen

    Published 2014-01-01
    “…In order to ensure terminal velocity constraint, a prediction of the terminal velocity is required, based on which, the approximated Bézier curve is adjusted. …”
    Get full text
    Article
  14. 154
  15. 155
  16. 156
  17. 157

    A method of IoT terminal’s network behavior monitoring based on network data by Ying LING, Yun QIU

    Published 2017-12-01
    “…The internet of things (IoT) is the network of physical devices,vehicles,home appliances and other items embedded with electronics,software,sensors,actuators and network connectivity which enable these objects to connect and exchange data.Every sensor node is a source of information.In the offered method,telecom network operators could analyze the network data and discover the abnormal situation of the IoT terminals,so as to ensure the normal use of the IoT terminals.A network behavior tag for the IoT terminals by analyzing the network data in the telecom network,and a real-time monitoring method for the IoT terminal network behavior were described.And take the wearable industry application for example,the analysis process of the internet of things network behavior was described.…”
    Get full text
    Article
  18. 158
  19. 159

    Data leakage prevention system based on transparent encryption for mobile terminal equipment by Zhen-tao HUANG, Nuan HE, An-min FU, Bo-yu KUANG, Guang-hua ZHANG

    Published 2016-10-01
    “…With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.…”
    Get full text
    Article
  20. 160