Showing 1,401 - 1,420 results of 2,763 for search '"The Terminator"', query time: 0.07s Refine Results
  1. 1401

    In vivo spontaneous Ca2+ activity in the pre-hearing mammalian cochlea by Francesca De Faveri, Federico Ceriani, Walter Marcotti

    Published 2025-01-01
    “…This synchronised IHC activity in vivo increases the probability of afferent terminal recruitment. Moreover, the modiolar-to-pillar segregation in sound sensitivity of mature auditory nerve fibres appears to be primed at pre-hearing ages.…”
    Get full text
    Article
  2. 1402

    Propagation and Production of Gulf Bluestem by Mack Thetford, Debbie Miller

    Published 2004-12-01
    “…This prostrate or creeping perennial spreads by long stolons and is easily distinguished by glaucous leaves, prostrate growth habit, and terminal inflorescences with stalked spikelets from 4.0 to 6.5 mm (0.15 to 0.26 in) (Clewell 1985). …”
    Get full text
    Article
  3. 1403

    Research and application of V2X based on MEC by Jiahui QIU, Zhichao ZHOU, Xiaobo LIN, Yu XIAO, Chao CAI, Liu LIU

    Published 2020-06-01
    “…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
    Get full text
    Article
  4. 1404

    À propos realizmu by Alicja Helman

    Published 2011-12-01
    “… Autorka wychodzi z założenia, że w historii myśli filmowej nie ma pojęcia, które byłoby tak jak realizm obciążone wieloznacznością, niejasnością, prowadziło do kontrowersji i sprzeczności. Termin ten odnosi się do fenomenów nader różnych; zarówno do postaw twórczych, środków wyrazu, ekranowego efektu, jak i postaw odbiorczych. …”
    Get full text
    Article
  5. 1405

    N-terminomics profiling of host proteins targeted by excretory-secretory proteases of the nematode Angiostrongylus vasorum identifies points of interaction with canine coagulation... by Nina Germitsch, Tobias Kockmann, Manuela Schnyder, Lucienne Tritten

    Published 2025-01-01
    “…We analysed A. vasorum excretory/secretory protein (ESP)-treated dog plasma and serum by N-terminome analysis using Terminal Amine Isotopic Labelling of Substrates (TAILS) to identify cleaved host substrates. …”
    Get full text
    Article
  6. 1406

    Abelia x grandiflora 'Sherwoodii' by Edward F. Gilman

    Published 2004-10-01
    “…Reaching a height of 3 to 6 feet with a spread of 6 to 10 feet, the mounded form of 'Sherwoodii' glossy abelia is clothed from spring through fall with terminal clusters of delicate pink and white, small, tubular flowers. …”
    Get full text
    Article
  7. 1407

    DMA-based key generation method for IoT scenario by Yinuo HAO, Zhou ZHONG, Xiaoli SUN, Liang JIN

    Published 2022-12-01
    “…Aiming at the problems of slow update frequency of channel key, low generation rate and limited node resources in the IoT scenario, a DMA-based physical layer key generation method was proposed, by using the agility and reconfigurability of DMA to improve the time variability and randomness of received signal.Firstly, DMA was used by the transmitter to randomly weight the signal and send it to the receiver, which could enhance the randomness of signals on the premise of ensuring the transparent reception of the signal.Then, the key from the received signal was extracted by the sender and receiver.By combining the rapid changeability and randomness of DMA, the randomness of signal source and the randomness of natural channel, a composite channel was constructed to improve the randomness of the key source.In addition, the channel estimation was transfered overhead from the terminal to the base station, which effectively reduced the overhead and delay of the communication system, and was suitable for IoT scenarios with asymmetric resources and lightweight equipment.Simulation results show that the proposed method can effectively improve the key generation rate in quasi-static scenarios, and the generated physical layer key has passed the NIST test.…”
    Get full text
    Article
  8. 1408

    A multi-hop D2D and social awareness based novel relay selection algorithm by Liang LI, Xinjie YANG

    Published 2022-08-01
    “…The social domain was introduced to multi-hop D2D (device-to-device) communication in cellular network scenarios, and a novel relay selection algorithm for multi-hop D2D communication under cellular network was proposed.Unlike existing relay selection algorithms, the proposed algorithm selects relays for each hop in reverse order, which reduces the signaling overhead caused by algorithm implement.Then, social domain information of mobile terminals was introduced to the algorithm and its influence on the algorithm’s performance was studied, which was found significant enough not to be overlooked hence providing useful guidance to designing algorithms in practical systems.Moreover, via extensive Monte Carlo simulations, it is discovered that the proposed algorithm outperforms the benchmarks in terms of data throughput and energy efficiency in absence of social relationship information.In a more practical implementation with social relationship information included, the proposed algorithm though naturally achieving less throughput, significantly outperforms the benchmarks in energy efficiency.…”
    Get full text
    Article
  9. 1409

    Safety Technology Risks and Countermeasures in the Intelligent Construction of Coal Mines by Jinyan Bai, Dezhi Zheng, Chen Jia

    Published 2022-01-01
    “…Based on the analysis of the process of China’s intelligent construction, this paper describes the safety management and control risks and the technical challenges faced by China’s intelligent coal mine construction in terms of norms and standards, data acquisition, subsystem and terminal sensors, multisystem integration, safety risk management, and control ability. …”
    Get full text
    Article
  10. 1410

    Editorial by Henri Le Prieult

    Published 2018-07-01
    “…Gaëlle Ferré et Manon Lelandais analysent l’apport informationnel de trois types de propositions subordonnées suivant une analyse multimodale. Enfin, ce numéro se termine par une nouvelle étude de Pierre Fournier portant sur les composés savants suffixés en anglais contemporain.…”
    Get full text
    Article
  11. 1411

    Spin orbit coupling effect on coherent transport properties of graphene nanoscopic rings in external magnetic field by A. Poszwa

    Published 2024-12-01
    “…The possibility of an effective control the two-terminal spin resolved resistances of the system and the spin polarization of equilibrium charge current as well as a nonequilibrium net current by means of RSO coupling and magnetic flux through the system, leading to an increase of the functionality of graphene in potential electronic applications, has been demonstrated.…”
    Get full text
    Article
  12. 1412

    Research on accurate and efficient coverage of 5G private network by Jingbo ZHAO, Shilei DONG, Tingyu HUANG, Mengxia CHEN, Peng HUANG

    Published 2022-05-01
    “…5G private network has become a new information infrastructure in all trades and professions because of its customizability, stable performance, safety and reliability.At the same time, due to the industry's higher requirements for business stability, certainty, energy conservation and low cost, 5G private network is urgently needed to achieve more accurate and efficient coverage than the public network.Taking the automated warehouse as a typical industry business scenario, a method to improve the accurate coverage of 5G private network by building a small experimental environment and optimizing the propagation model was proposed.Based on the refined modeling and simulation of the antenna gain of the typical space of the automated three-dimensional warehouse, combined with the test RSRP (Reference Signal Receiving Power) data of the typical space, the propagation model can be accurately corrected.According to the service level agreement (SLA) requirements of the industry terminal, the 5G private network accurate coverage parameters common to automated three-dimensional warehouses of different sizes can be obtained.…”
    Get full text
    Article
  13. 1413

    A mobility support method based on ELM prediction for named data networking by Hua QU, Yansong LI, Jihong ZHAO, Dongxu ZHAO, Jianlong ZHAO

    Published 2017-12-01
    “…Named data networking (NDN) is a new generation network architecture under the guidance of information center network,and the mobility support method is the main research point in NDN.In the traditional way of the producer-side mobility support method,the post-response mode is adopted,which makes it impossible to realize the transparency of the switching process.A mobility support method called PB based on ELM prediction was proposed.In the method,the original forwarding interest base was modified and a new control message packet was added so that the corresponding node in the network could adjust the result of the prediction algorithm in advance,and the switch of the producer terminal could respond to the interest package at any time by means of interest packet multicast.At the same time,the method provided a way to quickly restore the original state of the network for the problem that the prediction may fail.The simulation results show that the proposed PB mobility support method can reduce the handoff latency and the packet loss caused by handoff compared with the RP and IP mobility support methods.…”
    Get full text
    Article
  14. 1414

    Research and prospect of intelligent internet of vehicles based on 5G technology by Rongyue YANG, Pengzhou ZHANG, Qing SONG

    Published 2020-05-01
    “…With the rapid development of 5G communication technology,in the future,V2X will take 5G communication technology as the starting point,integrate 5G vehicle unit,5G base station,5G mobile terminal,5G cloud server and other advanced equipment,to provide comprehensive and high-quality services for multi-type users.Firstly,the key technologies of V2X and its evolution to 5G era were outlined.5G is deeply integrated with the internet of vehicles,which has the technical advantages of relatively low deployment cost and clear evolution route.Then,the application and research status of 5G emerging key technologies such as mobile edge computing (MEC) and network slicing in typical application scenarios of the Internet of vehicles was focused on.Finally,the problems of 5G internet of vehicles in communication interference,network security and privacy protection,communication interference were put forward,and the research direction was pointed out.…”
    Get full text
    Article
  15. 1415

    Optimizing Intermodal Transport and Hub Location Problem for ECOWAS in the Context of Improving Intra-African Trade by Shi Jihui, Kesewa Opoku Agyemang, Cheng Zhaolin

    Published 2022-01-01
    “…The ten highest-ranking nodes identified from the mixed-integer linear program adopted as candidate hubs, thus selecting Ibeshe ferry terminal in Lagos and Tema Harbour in Accra for waterway; Thies, Ibadan, Conakry, Monrovia and Thies for railway; and Thies and Ibadan for road. …”
    Get full text
    Article
  16. 1416

    Waypoint Position Optimization for Accurate Ground-Based Arrival Time Control of Aircraft by Noboru Takeichi

    Published 2018-01-01
    “…An optimization problem was formulated that defined the arrival time uncertainty at the terminal point as the objective function and numerically solved using sequential quadratic programming. …”
    Get full text
    Article
  17. 1417

    Cultivation of Innovative Ability of College Physical Education Students Based on the Internet of Things Multimedia Environment by Bin Cai

    Published 2022-01-01
    “…The purpose of this paper is to study the cultivation of students’ innovative ability of physical education majors in colleges and universities based on the multimedia environment of the Internet of things and to open up a new path for the cultivation of college students’ innovative ability. In this paper, a terminal collaborative indoor positioning algorithm based on RSSI fingerprint optimization was proposed to study the innovation ability of physical education students in colleges and universities. …”
    Get full text
    Article
  18. 1418

    Failure recovery algorithm for LRT and transaction property analysis by Xiao-yong MEI, Chang-qin HUANG, Xiao-lin ZHENG, De-ren CHEN, Shi-xian LI

    Published 2012-04-01
    “…Researchers have worked on recovery strategies of composition transactions,most efforts focus on transaction consistency by backward recovery,compensation is commonly used for backward recovery,which have limitations since the cost of compensation tasks are rather expensive,and the compensation mechanism can not satisfy various requirements of applications.A transaction recovery algorithm was proposed including forward recovery,backward recovery and alternative recovery,which was a formal modeling method based on extended Petri nets,state token,data token and QoS token were introduced to implement relaxed ACID properties of LRT.When failure occurs,terminate dependency point (TDP) and compensation set were calculated dynamically,recovery strategies were added or deleted automatically according to the data flow dependency,control flow dependency and state dependency among tasks.Failure types are generated by log file mining,therefore,failure coordination and recovery are implemented and an executable model which support add/delete failure recovery behavior is constructed seamlessly.…”
    Get full text
    Article
  19. 1419

    Collaborative Task Offloading Strategy of UAV Cluster Using Improved Genetic Algorithm in Mobile Edge Computing by Hong Wang

    Published 2021-01-01
    “…First, for the scenario of the UAV cluster serving multiple ground terminals, a collaborative task offloading model is formulated to offload the tasks to UAVs or the base station selectively. …”
    Get full text
    Article
  20. 1420

    The N17 domain of huntingtin as a multifaceted player in Huntington’s disease by Hyunju Cho

    Published 2025-01-01
    “…Huntington’s disease (HD) is primarily caused by the aberrant aggregation of the N-terminal exon 1 fragment of mutant huntingtin protein (mHttex1) with expanded polyglutamine (polyQ) repeats in neurons. …”
    Get full text
    Article