Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- Moral and ethical aspects 4
- Leadership 3
- Advertising 2
- Customer relations 2
- Customer services 2
- Economic policy 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Public administration 2
- Social media 2
- Aquatic plants 1
- Attitudes 1
- Authoritarianism 1
- Children 1
- Communication 1
- Consumers 1
- Criminal investigation 1
- Cultural policy 1
- Cultural property 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Delivery of Health Care 1
- Diversity in the workplace 1
- Economic Policy 1
- Economics 1
-
2601
Efektywność wykorzystania zasobów w różnych typach gospodarstwach
Published 2018-07-01Get full text
Article -
2602
-
2603
Zarządzanie tożsamością marek w przedsiębiorstwach sektora żywnościowego
Published 2013-12-01Get full text
Article -
2604
Vanesia (Saint-Jean-Poutge, Gers) : une mutatio aquitaine de l’Itinéraire de Bordeaux à Jérusalem
Published 2016-12-01“…This article reports on the findings of the programmed excavation of the Vanesia relay station, established in the Baïse plain, after which it was named. …”
Get full text
Article -
2605
-
2606
Integracja przestrzenna rynków hurtowych – zastosowanie dla rynku fasoli szparagowej
Published 2018-12-01Get full text
Article -
2607
Secure Transmission Based on Antenna Selection for Network Coding System
Published 2015-02-01“…The selection criteria for the source nodes and relay nodes were proposed over a slowly varying channel. …”
Get full text
Article -
2608
Priority-based message forwarding and query processing in opportunistic wireless sensor network
Published 2014-03-01“…A priority-based algorithm called PBQ was proposed for the query forwarding and processing in opportunistic wireless sensor network.Through the user-defined query priorities,the proposed algorithm properly selects the relay nodes and controlls the forwarding and the amount of messages.Meanwhile,the query priorities were adjusted dynamically so that the query results could be forwarded back to the source node of the query quickly and the residual query request messages could be cleaned up from the network,saving lots of unnecessary transmissions and improving the overall utility of query processing.Simulating results show that PBQ could effectively improve the success rate of queries,and reduce the cost and delay of query processing in opportunistic wireless sensor network.…”
Get full text
Article -
2609
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01“…SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.…”
Get full text
Article -
2610
Delay and energy minimization for MEC-based secure communication
Published 2020-11-01“…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
Get full text
Article -
2611
O produkcie bez słów. Pozajęzykowe sposoby wyrażania wartości w tzw. cichej recenzji w serwisie TikTok
Published 2024-12-01Get full text
Article -
2612
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01“…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
Get full text
Article -
2613
LTE D2D based vehicle networking communication architecture and data distributing strategy
Published 2016-07-01“…Besides, a D2D cooperative relay-ing forward strategy under the constraint of latency for distributing multimedia streaming were proposed, which resulted in significant improvement of data transmission rate and network throughput.…”
Get full text
Article -
2614
Przeciwdziałanie marginalizacji niepełnosprawnych w życiu wspólnotowym Kościoła
Published 2019-01-01Get full text
Article -
2615
-
2616
Research on cognitive user pairing and cooperative sensing
Published 2012-01-01“…Aim at the shortages of the cooperative algorithm in sensing and time slot spent,an optimal cognitive users pairing and cooperative sensing algorithm was proposed.To achieve the best sensing performance,the pairing criterion was adopted where the one with the best receive SNR was used for the sense user and the one with the second-best receive SNR was used for the relay.According to optimizing cooperation threshold,non-cooperative or cooperative mode was selected,which made time slot spent much lower but sensing ability slight decreasing.Meanwhile,a lower bound of the detection probability and the time slot spent were derived in Rayleigh flat fading channels.Numerical results show the proposed algorithm has higher detection probability and lower time slot spent than the existing one.…”
Get full text
Article -
2617
ONG et Autorité Palestinienne : la « bonne gouvernance » dans un contexte de lutte nationale
Published 2007-07-01“…As a means of avoiding state interference, some large aid recipients use their international benefactors to relay criticisms of the Palestinian Authority. The financial aid they providentially receive gives them enough status to pretend to a political role. …”
Get full text
Article -
2618
Entre éducation relative à l'environnement et éducation scientifique, quelles complémentarités ?
Published 2003-10-01“…At a later stage, environmental education provides a new relay for efforts within an extended social network, making it possible to confront and therefore expand knowledge, skills and behaviour.…”
Get full text
Article -
2619
Czarodziejka przedmiotów. Z Albiną Barańską rozmawia Łukasz Maciejewski
Published 2011-06-01Get full text
Article -
2620
Polityka regionalna a rozwój wsi w Republice Czeskiej w kontekście integracji europejskiej
Published 2009-06-01Get full text
Article