Showing 1,501 - 1,520 results of 29,875 for search '"communication"', query time: 0.10s Refine Results
  1. 1501
  2. 1502

    Time- and Event-Driven Communication Process for Networked Control Systems: A Survey by Lei Zou, Zidong Wang, Hongli Dong, Yurong Liu, Huijun Gao

    Published 2014-01-01
    “…In particular, an urgent need has arisen to understand the effects of communication processes on system performances. Sampling and protocol are two fundamental aspects of a communication process which have attracted a great deal of research attention. …”
    Get full text
    Article
  3. 1503
  4. 1504
  5. 1505
  6. 1506

    THE MODERN METHODS OF COORDINATION IN MANAGEMENT OF UNITED NATIONS COMMUNICATION AND PUBLIC INFORMATION SYSTEM by T. Shchors

    Published 2016-05-01
    “…The author gives the detailed analyses of the specific of UN communication and public information system, describes the main changes in the result of the UN reform, the main characteristics of new strategic approach to communication, client-orientation approach to the UN public information, the specific of organization of information flow during the communication with internal and external target audiences.…”
    Get full text
    Article
  7. 1507
  8. 1508

    Chronic Non-communicable Diseases in Health Care Workers: a Multidisciplinary Approach by Teresa Rodríguez Rodríguez, Darianna María Muñiz Cabeza

    Published 2014-10-01
    “…<br /><strong>Objective:</strong> to determine major chronic non-communicable diseases and risk factors in health care workers. …”
    Get full text
    Article
  9. 1509
  10. 1510

    Effects of digital and non-digital parental distraction on parent-child interaction and communication by Souhir Chamam, Souhir Chamam, Alexia Forcella, Alexia Forcella, Nadia Musio, Nadia Musio, Florence Quinodoz, Florence Quinodoz, Nevena Dimitrova

    Published 2024-05-01
    “…It remains unclear, however, if parental distraction due to screen use affects parent-child interaction and communication more negatively compared to non-digital parental distraction. …”
    Get full text
    Article
  11. 1511

    Secret sharing-based authentication and key agreement protocol for machine-type communications by Ana Paula G Lopes, Lucas O Hilgert, Paulo RL Gondim, Jaime Lloret

    Published 2019-04-01
    “…The comparisons regard security properties and computational and communication costs. The safety of the protocol was formally verified through simulations conducted by automated validation of internet security protocols and applications.…”
    Get full text
    Article
  12. 1512
  13. 1513
  14. 1514
  15. 1515
  16. 1516
  17. 1517
  18. 1518

    Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication by Kun Zhang, Kezhen Han, Zhijian Hu, Guoqiang Tan

    Published 2025-01-01
    “…To construct the tracking dynamics under unreliable communication, the AVR's motion is analyzed. To mitigate information leakage and unauthorized access in vehicular network systems, an encrypted guaranteed-cost policy iteration algorithm is developed, incorporating encryption and decryption schemes between the vehicle and the cloud based on the tracking dynamics. …”
    Get full text
    Article
  19. 1519
  20. 1520

    One-time password authentication for one-way communication without re-registration by Qianqian LU, Youwen ZHU, Yan JIANG

    Published 2020-06-01
    “…One-time password is a password that is valid for only one session on a system or device.The existing one-time password scheme without re-registration which is not limited by the number of authentication only supports online authentication,but can not support offline authentication.To solve the above problems,a one-time password authentication scheme for one-way communication without re-registration was proposed.The scheme combined the time-based one-time password scheme with the way of no re-registration.It can realize the offline authentication while satisfying the infinite authentication times and the password time-effective.Finally,the security of the scheme is proved.…”
    Get full text
    Article