Showing 1,061 - 1,080 results of 29,875 for search '"communications"', query time: 0.10s Refine Results
  1. 1061

    The Effectiveness of Social Skills Training in Improving Students' Interpersonal Communication by Rafida Rafida, Budi Astuti

    Published 2024-06-01
    Subjects: “…effectiveness, interpersonal communication, social skills training…”
    Get full text
    Article
  2. 1062

    Developing Skills for Youthful Leaders Module 4: Communicating With Others by Elizabeth B. Bolton, John R. Rutledge, Linda Bowman, Linda Barber

    Published 2006-05-01
    “… The objectives of this lesson are to show that the process of communication is more than words, to demonstrate that communication is important to relationships, and to recognize barriers to good communication and learn ways to overcome them. …”
    Get full text
    Article
  3. 1063
  4. 1064
  5. 1065

    Dynamics of Professional and Communicative Tolerance in Educating International Relations Specialists by A. L. Temnitskiy

    Published 2014-02-01
    Subjects: “…the levels of the communicational tolerance…”
    Get full text
    Article
  6. 1066
  7. 1067

    Evaluation method of penetrating jamming effectiveness for cognitive communication protection by Zhiguo SUN, Shuo XIAO, Yijie WU, Shiming LI, Zhenduo WANG

    Published 2023-11-01
    “…In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability.…”
    Get full text
    Article
  8. 1068
  9. 1069
  10. 1070

    Research on indoor positioning algorithm based on visible light communication by Daming ZHAO, Xin WANG

    Published 2019-03-01
    Subjects: “…visible light communication…”
    Get full text
    Article
  11. 1071
  12. 1072

    Weibo Rumor Recognition Based on Communication and Stacking Ensemble Learning by Yu Wu, Yan Zeng, Jie Yang, Zhenni Zhao

    Published 2020-01-01
    “…Secondly, since the feature set used in rumor recognition research is not effective, by combining with communication, we construct a more suitable feature set for rumor recognition. …”
    Get full text
    Article
  13. 1073
  14. 1074
  15. 1075

    Coordination and persistence of aggressive visual communication in Siamese fighting fish by Claire P. Everett, Amy L. Norovich, Jessica E. Burke, Matthew R. Whiteway, Paula R. Villamayor, Pei-Yin Shih, Yuyang Zhu, Liam Paninski, Andres Bendesky

    Published 2025-01-01
    “…Summary: Outside acoustic communication, little is known about how animals coordinate social turn taking and how the brain drives engagement in these social interactions. …”
    Get full text
    Article
  16. 1076
  17. 1077
  18. 1078
  19. 1079
  20. 1080

    Logic-Based Security Architecture for Systems Providing Multihop Communication by Iman Almomani, Eman Al-Banna, Mousa AL-Akhras

    Published 2013-01-01
    “…Security is a basic element of distributed systems such as ad hoc and sensor communication networks. Several standards define security requirements and enforcers, such as ITU-T Recommendations X.800 and X.805. …”
    Get full text
    Article