Showing 741 - 760 results of 29,875 for search '"communication"', query time: 0.09s Refine Results
  1. 741

    Network slicing scheme for heterogeneous power wireless communication networks by Yan ZHEN, Mengyue YU, Haibo ZHAO

    Published 2020-02-01
    “…Targeted at power communication networks,the concepts of vertical and horizontal slicing was introduced,the slicing enabler technologies,then explain the technial challenges of realizing network slicing in power communication networks,finally a slicing scheme for heterogeneous power wireless communication networks was proposed in which vertical slicing guarantees specific applications’ quality and horizontal slicing improves efficiency and flexibility of system entities and terminal devices.…”
    Get full text
    Article
  2. 742
  3. 743

    Transmission characteristics of air-ground channel in aerial communication platform by Xiaobin FU, Baohui ZHENG

    Published 2018-01-01
    Subjects: “…aerial communication platform…”
    Get full text
    Article
  4. 744

    FBMC vs. PAM and DMT for High-Speed Wireline Communication by Jeremy Cosson-Martin, Jhoan Salinas, Hossein Shakiba, Ali Sheikholeslami

    Published 2024-01-01
    “…This paper demonstrates the first silicon-verified FBMC encoder and decoder designed to emulate beyond <inline-formula> <tex-math notation="LaTeX">$224Gb/s$ </tex-math></inline-formula> wireline communication. It also compares the performance of FBMC to PAM and DMT in three steps. …”
    Get full text
    Article
  5. 745
  6. 746
  7. 747

    Multivariate Rayleigh, Rice, and Nakagami distributions and their applications in communication theory by Yu. A. Brychkov, N. V. Savischenko

    Published 2024-07-01
    “…A method was developed to calculate the symbol and bit error probabilities for coherent diversity reception of multi-position signal structures in a communication channel with additive white Gaussian noise (AWGN) and general fading described by the multivariate Rayleigh and Nakagami distributions, as well as the bivariate Rice distribution.…”
    Get full text
    Article
  8. 748
  9. 749
  10. 750
  11. 751

    THE ROLE OF THE TEACHER IN PLANNING AND MONITORING GUIDENTS' WORK ON COMMUNICATIVE TASKS by Nazan TUTAŞ

    Published 2016-02-01
    “…THE ROLE OF THE TEACHER IN PLANNING AND MONITORING GUIDENTS' WORK ON COMMUNICATIVE TASKS…”
    Get full text
    Article
  12. 752

    Analysis of communication data of mobile terminal based on protocol reversal by Mingyuan ZHANG, Xinyu QI, Yubo SONG, Rongrong GU, Aiqun HU, Zhenchao ZHU

    Published 2018-12-01
    “…The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.…”
    Get full text
    Article
  13. 753

    Quantum secure communication network architecture and mobile application solution by Jianquan WANG, Zhangchao MA, Xinzhong LI, Lei SUN, Changwei HU

    Published 2018-09-01
    “…As the first practical representative technology in the new quantum revolution,quantum key distribution (QKD) brings a promising solution to achieve long-term security guarantee,which has made series of progress from research to practical deployment and applications in recent years.The architecture design of quantum secure communication network was firstly discussed,which extended point-to-point QKD link to multi-user QKD network.Furthermore,combining with the classical cryptography,an enhanced solution was proposed to apply the quantum key generated by QKD to the mobile terminals,which offered the possibility to apply QKD in general mobile applications.…”
    Get full text
    Article
  14. 754

    Communicative competence in Medical Psycology Students: A proposal of indicators. by Ana María Molina Gómez, Ana Cristina Cuéllar Marrero, Belkys González Aguiar

    Published 2009-11-01
    “…In this paper, there is a proposal of communicative competence indicators to be trained in Medical Psychology students, defined from dimensions and indicators proposed in the cognitive, communicative and socio-cultural approach, which reveals the importance of the syntactic dimension of discourse in an indissoluble relation to the semantic and pragmatic dimensions, according to the comprehension and construction of utterances and therefore in the development of communicative competence.…”
    Get full text
    Article
  15. 755

    Analysis and Protection for Information Security Event of Communication Industry User by Rong Wang, Hong Li, Xuan Jin

    Published 2013-08-01
    “…Some security incidents of user information were analyzed and the existent leaks were studied,the cause of the problem was summarized.The solution was put forward by analyzing from several aspects,like the user information protection,security technical means,sentimental information protection,security management system.Some constructive opinions and suggestions for the establishment of communication industry user information security system were put forward.It is practical and valuable for communication industry.…”
    Get full text
    Article
  16. 756
  17. 757
  18. 758
  19. 759
  20. 760