Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
1461
SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization
Published 2015-04-01“…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
Get full text
Article -
1462
Performance analysis of UWB-IR anti-intercepting communication based on chaotic mapping
Published 2005-01-01“…UWB-IR technology has been concerned in military communications in recent years because of its high data rate,low power consumption,low probability of detection and low probability of interception.By applying the chaos mapping into the UWB-IR was applied and proposed a novel module for chaos modulation and demodulation was proposed,which enhances both the capability of anti-detecting and the capability of anti-intercepting of the UWB-IR.Furthermore,The feasibility of this application was verified.through simulations…”
Get full text
Article -
1463
A secure message-passing framework for inter-vehicular communication using blockchain
Published 2019-02-01“…Internet of vehicles provides the communication channel between the vehicles, but existing solutions require a centralized communication system to distribute the message and to authenticate the source. …”
Get full text
Article -
1464
Analysis and application evaluation of precoding method based on low-band communication system
Published 2019-01-01Subjects: “…low-band communication system…”
Get full text
Article -
1465
Performance analysis of covert wireless communication based on beam forming with noise uncertainty
Published 2020-07-01Subjects: “…covert wireless communication…”
Get full text
Article -
1466
Editorial: Recreational team sports: prevention, treatment, and rehabilitation of non-communicable diseases
Published 2025-01-01Get full text
Article -
1467
Nonverbal Communication and its Effects on Human Relations: An Analysis from Surah Luqman
Published 2025-01-01Subjects: “…nonverbal communication…”
Get full text
Article -
1468
Research on the Impact of Environmental Regulation on Enterprise Innovation from the Perspective of Official Communication
Published 2021-01-01“…Meanwhile, there is an inverted U-type relationship between official communication and innovation of enterprises. Furthermore, at present, the average level of official communication in China is too high, which will weaken the role of environmental regulation in promoting enterprise innovation. …”
Get full text
Article -
1469
Assessing “beneficiary” communities’ participation in HIV/AIDS communication through community radio
Published 2022-10-01Subjects: “…HIV/AIDS communication…”
Get full text
Article -
1470
Mental health risk communication and community participation among an Indigenous people in Colombia
Published 2025-01-01Subjects: Get full text
Article -
1471
Clustering of the Russian regions by information and communication technologies indicators – infrastructure and Internet access
Published 2023-06-01Subjects: Get full text
Article -
1472
Research on Key Technology and Application of Airborne Wireless Systems for Public Mobile Communication
Published 2014-03-01Subjects: “…airborne public mobile communication…”
Get full text
Article -
1473
Joint optimization of trajectory and resource allocation for UAV integrated radar and communication system
Published 2021-11-01Subjects: “…integrated radar and communication system…”
Get full text
Article -
1474
Asking and answering: A contrastive study of English and Swedish basic communication verbs
Published 2016-12-01Subjects: Get full text
Article -
1475
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01“…In intelligent transportation systems, it is crucial for smart vehicles to broadcast real-time vehicle track messages to coordinate driving decisions and ensure driving safety.However, attackers can manipulate vehicle tracks by modifying timestamps or manipulating signal frequencies, posing a threat to security.To address this problem, a lightweight vehicle track verification scheme was proposed, utilizing the broadcast communication channels to achieve secure verification of vehicle tracks without any special hardware support.Without time synchronization, each verifier calculated the time interval between the reception time of the message and the sending timestamp.Spatial position constraint equations are formulated by combining these time intervals between any two verifiers, effectively defending against timestamp forgery attacks.Additionally, each verifier calculates the Doppler frequency shift between the arrival frequency and the scheduled transmit frequency.Velocity vector constraint equations were formulated by combining these frequency shifts between any two verifiers, providing defense against carrier frequency manipulation attacks.Formal analysis shows that increasing the number of verifiers improves the accuracy of the proposed verification scheme.Experimental results in a real-world environment further validate that the proposed verification scheme exhibits the best performance when the number of verifiers is set to 3.Compared to the existing solution, the proposed verification scheme has a higher accuracy, lower false rejection rate, and lower false acceptance rate when validating true vehicle track and false vehicle track separately.…”
Get full text
Article -
1476
Wireless Secure Communication Based on Code Domain Space-Time Modulated Metasurface
Published 2024-12-01Subjects: Get full text
Article -
1477
Research on maximizing energy efficiency for relay-aided D2D communication
Published 2020-03-01Subjects: “…D2D communication…”
Get full text
Article -
1478
TEACHER-PUPIL COMMUNICATION IN THE CONTEXT OF BELLES-LETTRES. II YEAR STUDENT'S REFLECTION
Published 2017-11-01Subjects: “…Communication…”
Get full text
Article -
1479
User authentication scheme based on the ElGamal signature for mobile communication system
Published 2005-01-01Subjects: “…mobile communication…”
Get full text
Article -
1480