-
141
Estimation and compensation for transmitter and receiver I/Q imbalance of full-duplex terminals
Published 2017-01-01“…In order to reduce I/Q imbalance of the full-duplex terminal with direct-conversion transceiver,an algorithm based on self-interference signal was proposed for the estimation and compensation of I/Q imbalance in both transmitter (Tx) and receiver (Rx).Without the perfect transmitter or receiver for I/Q imbalance estimation,the self-interference signal from Tx chain to Rx chain was used for parameter estimation and separation,and the Tx and Rx I/Q imbalance parameters were obtained,respectively.Then the pre-compensation before transmission and the correction after receiving was processed,so that there was nearly no I/Q imbalance in this full-duplex terminal from the view of the other terminals,and the complexity of the signal processing will be reduced as a result of the absent of the I/Q imbalance estimation.The simulation results show that the proposed algorithm can effectively estimate and compensate the I/Q imbalance of the full-duplex Tx & Rx terminal,and improve the overall signal quality and the system performance.…”
Get full text
Article -
142
Neural Terminal Sliding-Mode Control for Uncertain Systems with Building Structure Vibration
Published 2019-01-01“…To address this problem, a neural terminal sliding-mode control method is proposed. The proposed method is combined with a terminal sliding-mode and a hyperbolic tangent function to ensure that the considered system can be stabilized in finite-time without chattering. …”
Get full text
Article -
143
Networking model and traffic analysis for integrating ad hoc and LEO satellite terminals
Published 2006-01-01“…The compromise between the utilization rate of valuable satellite channels and the blocking probability of new call was hardly to achieve.Enlightened by the advantages of ad hoc networking,a new scheme was proposed which al-lowed the terminals to work in alternative mode according the instructions from the satellite’s signaling channel,meaned to communicate with other terminals in ad hoc mode when they were in a distance shorter than the maximum ad hoc communication distance and when the system was in busy state or in normal satellite communication mode when the system was idle.So the overflow traffic in nearer distance might get serviced with ad hoc mode and the system’s parame-ters was improved.Simulation results show that the proposed scheme has decreased the realistic call blocking probability and increased the valid channel utility rate of the system.…”
Get full text
Article -
144
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: “…mobile terminal…”
Get full text
Article -
145
Efficacy of laparoscopic cardiectomy combined with side overlap anastomosis for the treatment of terminal achalasia
Published 2025-01-01“…Abstract To investigate the safety and short-term effectiveness of laparoscopic-assisted cardiectomy with side-overlap esophagogastric reconstruction for the treatment of terminal or end-stage achalasia, patients with end-stage achalasia treated with laparoscopic-assisted cardiectomy with side-overlap esophagogastric reconstruction were retrospectively enrolled. …”
Get full text
Article -
146
PECULIARITIES OF DETERMINATION OF DECISION ABOUT TERMINATION OF PREGNANCY IN WOMEN OF DIFFERENT AGE GROUPS
Published 2018-09-01Subjects: Get full text
Article -
147
Study and Application of Multi-Terminal Interconnection Technology to Build Smart Home Network
Published 2014-05-01Subjects: Get full text
Article -
148
Scheduling Optimization for Twin ASC in an Automated Container Terminal Based on Graph Theory
Published 2022-01-01“…Aiming at the twin automated stacking cranes (ASCs) scheduling problem in a single block of an automated container terminal, resolving conflicts between ASCs is an important point that needs to be considered. …”
Get full text
Article -
149
Research on location privacy protection of mobile terminals for maritime monitoring sensor networks
Published 2021-12-01“…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
Get full text
Article -
150
Impact of Stochastically Perturbed Terminal Velocities on Convective-Scale Ensemble Forecasts of Precipitation
Published 2020-01-01“…An idealized supercell storm case was first used to determine the terminal velocity error characteristics for a one-moment microphysics scheme in terms of the terminal velocities from a two-moment scheme. …”
Get full text
Article -
151
Asistencia al enfermo terminal en la atención primaria de salud
Published 2011-01-01Subjects: “…enfermo terminal…”
Get full text
Article -
152
Critical Literature Review into Planning of Inter-Terminal Transport: In Port Areas and the Hinterland
Published 2019-01-01“…Nowadays, the major ports around the world usually consist of multiple terminals and service centers which are often run by different operators. …”
Get full text
Article -
153
Neural Network Assisted Inverse Dynamic Guidance for Terminally Constrained Entry Flight
Published 2014-01-01“…In order to ensure terminal velocity constraint, a prediction of the terminal velocity is required, based on which, the approximated Bézier curve is adjusted. …”
Get full text
Article -
154
Cancer Cachexia: Innovations in Pharmacotherapy for Terminal-Stage Patients - Review of the latest reports
Published 2025-01-01Get full text
Article -
155
Beyond Humanoid Prosthetic Hands: Modular Terminal Devices That Improve User Performance
Published 2025-01-01Get full text
Article -
156
Issue analysis of contracts termination in Russian state and municipal public procurement procedures
Published 2022-07-01Subjects: Get full text
Article -
157
A method of IoT terminal’s network behavior monitoring based on network data
Published 2017-12-01“…The internet of things (IoT) is the network of physical devices,vehicles,home appliances and other items embedded with electronics,software,sensors,actuators and network connectivity which enable these objects to connect and exchange data.Every sensor node is a source of information.In the offered method,telecom network operators could analyze the network data and discover the abnormal situation of the IoT terminals,so as to ensure the normal use of the IoT terminals.A network behavior tag for the IoT terminals by analyzing the network data in the telecom network,and a real-time monitoring method for the IoT terminal network behavior were described.And take the wearable industry application for example,the analysis process of the internet of things network behavior was described.…”
Get full text
Article -
158
Evaluation of terminal blend rubberized asphalt incorporating high crumb rubber content
Published 2025-07-01Subjects: Get full text
Article -
159
Data leakage prevention system based on transparent encryption for mobile terminal equipment
Published 2016-10-01“…With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.…”
Get full text
Article -
160
Research and application of terminal service integration digital engine in power supply stations
Published 2023-11-01Subjects: Get full text
Article