-
921
Living body recognition method based on facial feature point motion
Published 2018-06-01“…A kind of living body recognition method was proposed,which was applied in mobile terminal and based on the deep learning.A facial movements LSTM network was trained using data sets.When users input a random sequence of video,user’s facial feature point data can be gained and whether the video forgery attacks happened will be determined by input user’s facial feature point data into circulation neural network.The test data shows that the proposed method can be protected effectively from photograph attack and video replay attack.…”
Get full text
Article -
922
Ecological System of Open Platform and Development of the Third Party Service Market
Published 2014-08-01“…Emerging industrial power, such as terminal producers and internet companies, has gained the first mover advantage in the control of the mobile internet industry chain by using the open platform. …”
Get full text
Article -
923
Scheme of Smart Home Application Control Based on Cloud Service
Published 2015-11-01“…How smart home devices access network,how intelligent control terminals control the smart home equipment,and how smart home devices and application management platform manage users and devices,all the solutions of these problems are changing with the rapid development of smart home application.The application control mode of smart home service was showed,which leads to the key logic hierarchy structure of the application control mode.On the basis of the key logical hierarchy structure,application control scheme based on cloud services was discussed.Finally a summary was given.…”
Get full text
Article -
924
Research on RTCWeb and Its Merging with IMS
Published 2013-01-01“…It is a better choice for service developers, network operators and terminal users. This paper firstly introduced RTCWeb's communication model and key technologies, then proposed the conception of RTCWeb's merging with IMS and gave the specific solutions under the conception, finally gave a summery and a prospect for future evolution of IMS based RTCWeb system.…”
Get full text
Article -
925
Intestinal Necrosis due to Giant Ovarian Cyst: A Case Report
Published 2013-01-01“…Two mechanisms are involved in intestinal complications due to ovarian cysts: torsion due to adhesion or compression of giant ovarian mass with a diameter of 9-10 cm. We report here a terminal ileum necrosis case due to compression by an ovarian cyst with 11 × 10 × 7 cm size in an 81-year-old woman.…”
Get full text
Article -
926
Principle and Architecture Analysis of VoWi-Fi Technology
Published 2015-09-01“…With the commercial application of VoWi-Fi technology and support of terminals such as apple mobile phone for Wi-Fi calling technology, VoWi-Fi technology has become a hot spot in the industry once again. …”
Get full text
Article -
927
Design of Single Degree of an Intersecting Line Translational Mechanism
Published 2023-07-01“…The output characteristics of the terminal running trajectory are analyzed, and the feasibility of the mechanism is verified.…”
Get full text
Article -
928
Broad Mite, Polyphagotarsonemus latus (Banks) (Arachnida: Acari: Tarsonemidae)
Published 2004-03-01“… The broad mite, Polyphagotarsonemus latus, was first described by Banks (1904) as Tarsonemus latus from the terminal buds of mango in a greenhouse in Washington, D.C., USA (Denmark 1980). …”
Get full text
Article -
929
Tobacco Budworm, Heliothis virescens (Fabricius) (Insecta: Lepidoptera: Noctuidae)
Published 2012-10-01“…Larvae bore into buds and blossoms (the basis for the common name of this insect), and sometimes the tender terminal foliar growth, leaf petioles, and stalks. …”
Get full text
Article -
930
Password authentication scheme for mobile computing environment
Published 2007-01-01“…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
Get full text
Article -
931
Reference Intervals (RIs) of the Bone Turnover Markers (BTMs) in Children and Adolescents: A Proposal for Effective Use
Published 2024-12-01“…The aim of this study was to establish the RI for the BTM [specific bone alkaline phosphatase (BALP), carboxy-terminal cross-linked collagen type I telopeptide (CTX), N-terminal propeptide pro-collagen type I (PINP), osteocalcin (OC), resistant to acid tartrate phosphatase isoform 5b (TRAcP-5b)] on serum samples from children and adolescents. …”
Get full text
Article -
932
To be or not to be phosphorylated: understanding the role of Ebola virus nucleoprotein in the dynamic interplay with the transcriptional activator VP30 and the host phosphatase PP2...
Published 2025-12-01“…Both binding sites are located in close proximity to each other in NP’s C-terminal-disordered region. This study investigates NP’s role in VP30 dephosphorylation and transcription activation, focussing on the spatial requirements of NP’s binding sites. …”
Get full text
Article -
933
Pre-immunotherapy alters stereotactic ablative radiotherapy-induced systemic T cell responses in early-stage NSCLC
Published 2025-02-01“…Of note, both SABR and icSABR largely changed TCR clonotypes, which were mainly large clones post-SABR but single clone post-icSABR, and predominantly from terminal effector CD8+ T cells and T helper cells, respectively. …”
Get full text
Article -
934
Activation of the periaqueductal gray controls respiratory output through a distributed brain network
Published 2025-01-01“…We then stimulated PAG terminals in those regions to determine whether their activity can account for the observed effects of PAG stimulation.ResultsDirectly stimulating the PAG resulted in prominent changes to all recorded muscle activities and reset the breathing rhythm in either a phase-independent or phase-dependent manner. …”
Get full text
Article -
935
Structural dynamics of RAF1-HSP90-CDC37 and HSP90 complexes reveal asymmetric client interactions and key structural elements
Published 2024-03-01“…We also describe structures of HSP90 dimers without RAF1 and CDC37, displaying only N-terminal and middle domains, which we term the semi-open state. …”
Get full text
Article -
936
Two Cases of Leigh Syndrome in One Family: Diagnostic Challenges and Clinical Management Experience in Latvia
Published 2021-01-01“…The difficulties encountered establishing a diagnosis for the first proband and the effective prenatal diagnosis for the second offspring that led to termination of the pregnancy are discussed.…”
Get full text
Article -
937
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01“…Additionally, the scheme employed key policy attribute-based encryption for fine-grained control over search operations, and utilized lightweight encryption algorithm and outsourced decryption mechanism to reduce computational overhead on user terminals. Finally, security analysis and experimental evaluations demonstrated the security and feasibility of the proposed scheme.…”
Get full text
Article -
938
Research and application of DRM technology in IPTV UHD video
Published 2018-11-01“…The characteristics and differences of different DRM standards such as OMA,Microsoft,Intertrust,and ChinaDRM were compared.The requirements of DRM applications were presented.The key technologies of DRM were analyzed.Based on the high-tech set-top box commonly used in the industry,the architecture of DRM protection in IPTV high-definition video was designed.The hardware trust root of high security set-top box,remote download terminal key,double-encrypted content key and other mechanisms was put forward innovatively.Finally,the business process of decrypting DRM content was formulated and an implementation case was given.…”
Get full text
Article -
939
PROBLEMS OF DEVIANT BEHAVIOR AMONG STUDENTS
Published 2016-11-01“…Currently, there is a tendency to «transform» education into a way of getting diplomas, high-paying job or a delay from the army, in other words, in a terminal value, which largely contributes to the development of specific deviations. …”
Get full text
Article -
940
VARIABILITY OF A FRAGMENT OF THE ACID VACUOLAR INVERTASE PAIN-1 GENE IN POTATO CULTIVARS
Published 2015-01-01“…It was shown that the conservative C-terminal domain contained three variable amino acids.…”
Get full text
Article