Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
1081
Adaptive fuzzy filter algorithm for LEO communication channel estimation
Published 2006-01-01Get full text
Article -
1082
Distributed Time Division Pattern Formation for Wireless Communication Networks
Published 2005-01-01Get full text
Article -
1083
Communicating Museums: A Textual Analysis of Content and Interaction Management
Published 2018-01-01Subjects: Get full text
Article -
1084
Novel Chaos Secure Communication System Based on Walsh Code
Published 2015-01-01“…A multiuser communication scheme which is a hybrid of Walsh code with DCSK and CDSK is proposed to improve low data transmission rate of Differential Chaos Shift Keying (DCSK), poor bit error ratio (BER) performance of Correlation Delay Shift Keying (CDSK), and disadvantage of orthogonality in traditional multiuser DCSK. …”
Get full text
Article -
1085
Research on beam management of non-coaxial OAM communication system
Published 2021-12-01“…As a new modulated degree of freedom, orbital angular momentum (OAM) could greatly improve the spectrum utilization of wireless communication.However, the uniform circular array (UCA)-based OAM communication system requires the transceiver array to be static and perfectly aligned, which makes it difficult for OAM to be practically applied.A beam management method based on OAM was proposed, which determined the best beam matching by scanning the beam of receiver and receiver, and the matched beam was used to communicate.Simulation results show that the proposed scheme could effectively reduce the system performance degradation caused by non-coaxial of receiver and transmitter arrays.…”
Get full text
Article -
1086
Study on the Security Access Technology of Business Platform Communication Network
Published 2014-04-01“…Combined with the features of telecom operator communications network, the security access technology from business platform to signaling network was discussed, and the key technology about business platform accessing security gateway was elaborated. …”
Get full text
Article -
1087
The Impact of the COVID-19 Pandemic on Communication Studies: Bibliometric Analysis
Published 2021-10-01Subjects: Get full text
Article -
1088
Consideration and suggestion of talents team construction for information and communication industry
Published 2016-12-01Subjects: “…information and communication industry…”
Get full text
Article -
1089
The second quarter of 2014 main communication capacity of telecommunication industry
Published 2014-07-01Get full text
Article -
1090
An Innovative Communication Paradigm for the Future of Public Relations: Artificial Intelligence
Published 2024-03-01Subjects: Get full text
Article -
1091
Communication service escape strategy oriented to the smart distribution grid
Published 2018-03-01“…With the development of the smart grid,the communication network for distribution grid plays a more and more importantl supporting role in smart distribution grid.There are various types of communication services in distribution grid,and they differ in communication requirements.A single network cannot meet the needs of all of them.Thus,it is necessary to introduce the heterogeneous network architecture into smart distribution.To improve the reliability of distribution grid,a multi-objective escape strategy based on heterogeneous access networks was proposed,which considered the current state of the communication and services requirements.Based on the network capacity,a multi-objective model subjected to the service functions of real-time (RT) and non-real-time (NRT) services was consouctd by this strategy.And then NSGA-II was adopted to get the Pareto front.The simulation results show that the strategy can guarantee the escape rate and timelines of RT and NRT distribution services.…”
Get full text
Article -
1092
Analysis and suggestions on inter-satellite laser communication of satellite Internet
Published 2024-02-01Subjects: “…inter-satellite laser communication…”
Get full text
Article -
1093
The Communication Solution for LTE System under Radar Interference Circumstance
Published 2015-01-01“…The interferences of radar and communication system coexistent environment are analyzed in this paper, and an attractive detection mechanism of the radar video signal and proportional fair scheduling algorithm based on channel sensing are proposed to realize the communication by using radar radiant intermissions. …”
Get full text
Article -
1094
Confidential communication scheme based on uncertainty of underwater noisy channels
Published 2019-04-01“…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
Get full text
Article -
1095
-
1096
SOC-Based Simulation of 3D MIMO Mobile-to-Mobile Fading Channels: A Riemann Sum Approach
Published 2024-01-01Subjects: Get full text
Article -
1097
-
1098
A Sparse Feature-Based Mixed Signal Frequencies Detecting for Unmanned Aerial Vehicle Communications
Published 2025-01-01Subjects: “…UAV communication…”
Get full text
Article -
1099
Connection Characteristics and Hierarchical Structure of China’s Urban Network-Based on the Communications Technology Service Industry
Published 2022-01-01“…Considering the importance of China’s digital economy, industrial Internet, and high-quality development, this study analyzed China’s urban network from the perspective of the communications technology service industry. Three sub-networks (R & D, sales, and investment) and a comprehensive network were constructed. …”
Get full text
Article -
1100
Experimental Demonstration of Special-Shaped 32-Quadrature Amplitude Modulation Constellations for Visible Light Communications
Published 2018-01-01“…With the rapid development of light-emitting diode, visible light communication (VLC) has become a candidate technology for the next generation of high-speed indoor wireless communication. …”
Get full text
Article