期刊文献+
共找到8,691篇文章
< 1 2 250 >
每页显示 20 50 100
Energy Efficient Covert Communication in a Direct Uplink Satellite-Ground Communication Scenario
1
作者 Fu Shu Zeng Wen +1 位作者 Yin Liuguo Zhao Lian 《China Communications》 2026年第1期166-174,共9页
Efficient energy utilization in covert communication sustains covertness while assuring communication quality and efficiency.This paper investigates covert communication energy efficiency(EE)in direct uplink satellite... Efficient energy utilization in covert communication sustains covertness while assuring communication quality and efficiency.This paper investigates covert communication energy efficiency(EE)in direct uplink satellite-ground communications,focusing on enhancing system EE via optimized transmit beamforming and satellite orbit altitude selection.This paper first establishes an optimization problem to maximize system EE in a direct uplink satelliteground covert communication scenario.To solve this non-convex optimization problem,it is decomposed into two subproblems and solved using the successive convex approximation(SCA)method.Based on the above methods,this paper proposes an overall iterative optimization algorithm.Simulation results demonstrate that the proposed algorithm surpasses the conventional baseline algorithms in terms of system EE.Furthermore,they elucidate the correlation between the amount of information received by the receiver and the variations in the satellite’s orbital altitude. 展开更多
关键词 covert communication direct uplink satellite-ground communication energy efficiency
在线阅读 下载PDF
Enhancing Disaster Response with IoFT:An Adaptive Communication Model for UAV-Based Surveillance
2
作者 A.F.M.Suaib Akhter 《Computer Modeling in Engineering & Sciences》 2026年第2期893-921,共29页
The modern world remains vulnerable to natural disasters,including floods,earthquakes,wildfires,and others.These events remain unpredictable and inevitable,and recovering quickly and effectively requires significant e... The modern world remains vulnerable to natural disasters,including floods,earthquakes,wildfires,and others.These events remain unpredictable and inevitable,and recovering quickly and effectively requires significant effort and expense.Monitoring is becoming more efficient thanks to technologies such as Unmanned Aerial Vehicles(UAVs),which can access hard-to-reach areas and provide real-time data.However,in disaster-affected areas,these monitoring systems may encounter many obstacles when communicating with servers or transmitting monitored data.This paper proposes an adaptive communication model to overcome the challenges faced in disaster-affected areas.A base station is responsible for collecting data(such as images and videos)captured by UAVs performing surveillance within its communication range.This station is typically a tower providing fixed cellular network service.However,in the absence of such a tower,a selected UAV may serve as the station,depending on the situation.If surveillance needs to be performed outside the coverage area,it can continue to communicate via nearby UAVs through cooperative communication.UAVs with internet support,known as the Internet of Flying Things(IoFT),will also be utilized to enhance communication capacity and efficiency.The proposed communication model is validated through experiments,showing superior data transmission performance and higher throughput.Analysis indicates it outperforms traditional systems,even in rural areas,with or without internet access. 展开更多
关键词 UAV communication IoFT natural disaster IOT
在线阅读 下载PDF
Analysis of Ningxia’s Tourism Culture and Ethnic Exchange,Communication and Integration
3
作者 SHI Ruiqing 《Cultural and Religious Studies》 2026年第1期78-82,共5页
Ningxia is an ethnic gathering area boasting abundant tourism and cultural resources.Developing the cause of tourism and culture is an important way to encourage all ethnic groups to respect differences,embrace divers... Ningxia is an ethnic gathering area boasting abundant tourism and cultural resources.Developing the cause of tourism and culture is an important way to encourage all ethnic groups to respect differences,embrace diversity,and demonstrate their interactions,exchanges,and integration in tourism activities.As an important preserve of the distinctive cultures of the Chinese nation and a prominent world tourist destination,Ningxia should strive to foster and consolidate the sense of a community with a shared future for the Chinese nation in developing its tourism and culture under the new historical conditions.It is imperative to advance the prosperity and development of tourism and culture in boosting ethnic interactions,exchanges,and integration through the formulation of tourism and cultural policies and plans,as well as the development and design of tourism and cultural projects. 展开更多
关键词 Ningxia tourism culture EXCHANGE communication and integration
在线阅读 下载PDF
Bias Calibration under Constrained Communication Using Modified Kalman Filter:Algorithm Design and Application to Gyroscope Parameter Error Calibration
4
作者 Qi Li Yifan Wang +2 位作者 Yuxi Liu Xingjing She Yixuan Wu 《Computer Modeling in Engineering & Sciences》 2026年第1期680-697,共18页
In data communication,limited communication resources often lead to measurement bias,which adversely affects subsequent system estimation if not effectively handled.This paper proposes a novel bias calibration algorit... In data communication,limited communication resources often lead to measurement bias,which adversely affects subsequent system estimation if not effectively handled.This paper proposes a novel bias calibration algorithm under communication constraints to achieve accurate system states of the interested system.An output-based event-triggered scheme is first employed to alleviate transmission burden.Accounting for the limited-communication-induced measurement bias,a novel bias calibration algorithm following the Kalman filtering line is developed to restrain the effect of the measurement bias on system estimation,thereby achieving accurate system state estimates.Subsequently,the Field Programmable Gate Array(FPGA)implementation of the proposed algorithm is also realized with the hope of providing fast bias calibration in practical scenarios.A simulation about a numerical example and a practical example(for gyroscope’s angular velocity bias calibration)on MATLAB is provided to demonstrate the feasibility and effectiveness of the proposed algorithm. 展开更多
关键词 Bias calibration state estimation limited communication event-Triggered scheme
在线阅读 下载PDF
Enhancing User Experience in AI-Powered Human-Computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
5
作者 Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第2期2909-2929,共21页
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition. 展开更多
关键词 Human-computer communication(HCC) vocal emotions live vocal artificial intelligence(AI) deep learning(DL) selfish herd optimization-tuned long/short K term memory(SHO-LSTM)
在线阅读 下载PDF
Channel Characteristics Analysis in Semi-Basement Scenarios for Smart Meter Communication Systems
6
作者 Wang Qing Zhang Zhaolei +1 位作者 Liu Yu Ren Yi 《China Communications》 2026年第1期92-106,共15页
The smart meter communication system has substantial application value for the construction and upgrading of the entire power system.The deployment of the transmitter(Tx)of the smart meter system in the residential sc... The smart meter communication system has substantial application value for the construction and upgrading of the entire power system.The deployment of the transmitter(Tx)of the smart meter system in the residential scenarios is vexed by the need for more theoretical support.This paper mainly studies the communication channel between the Tx at semibasement and receiver(Rx)at outdoor.The design of an effective communication system relies on an accurate understanding of channel characteristics.Channel measurements and ray-tracing channel modeling are conducted to obtain channel data.The influence of different positions at same semi-basement is studied.Typical channel characteristics are analyzed,such as power delay profile(PDP),power angular profile(PAP),root-mean-square(RMS)delay spread(DS),channel capacity,received power,and path loss.The influence of different semi-basement placements and different floor heights is also compared.Besides,the channel measurements and simulation data fit well,which can illustrate the validity and reliability of the acquired channel data.This paper can provide theoretical support for the design and optimization of smart meter communication systems in semi-basement scenarios. 展开更多
关键词 channel characteristics channel measurements ray-tracing method semi-basement scenarios smart meter communication
在线阅读 下载PDF
A Distributed Anonymous Reputation System for V2X Communication
7
作者 Shahidatul Sadiah Toru Nakanishi 《Computers, Materials & Continua》 2026年第4期1030-1050,共21页
V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles c... V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles can distort trust decisions and threaten road safety,privacy-preserving trust management is essential.Lu et al.previously presented BARS,an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication.In this system,reputation certificates without a vehicle identifier ensure anonymity,while two authorities jointly manage certificate issuance and reputation updates.However,the centralized certificate updates introduce scalability limitations,and the authorities can trace vehicle behavioral information,which threatens privacy guarantees.Several subsequent systems derived from BARS still rely on centralized certificate management and are subject to authority-side privacy leakage.As a result,a key challenge in this line of research remains unresolved:how to decentralize the certificate-update process while preserving privacy against the authorities in privacy-preservingV2X trustmanagement.In this paper,we propose a distributed anonymous reputation system for V2X communication,based on an anonymous reputation system for crowdsensing.In our proposed system for V2X communication,the server is distributed to a certificate authority(CA)and roadside units(RSUs).Each vehicle shows the reputation level to the nearest RSU at the beginning of each time interval,and registers a short-time public key.In the interval,the messages from the vehicle are authenticated under the public key and are scored.At the end of the interval,the nearest RSU updates the certificate anonymously.Our solution decentralizes the certificate-update process by assigning each update to the nearest RSU.A zero-knowledge-proof-based show protocol removes the need for any central authority to handle vehicle certificates and thus prevents the authorities from tracing vehicle activities.Compared with BARS,where centralized authorities must update the reputation certificates of many vehicles and may incur communication and processing delays,our system performs each update locally at the nearest RSUonce per interval.The required interaction consists only of a fewkilobytes of communication and a zero-knowledge proof that is almost fully precomputed on the vehicle side,while the RSU-side processing is estimated to take about 40 ms based on timingmeasurements of the underlying cryptographic operations.This distributed updatemodel avoids the centralized bottleneck of BARS and simultaneously removes the privacy risk arising from authority collusion. 展开更多
关键词 V2X communication anonymous reputation system proof of knowledge
在线阅读 下载PDF
Integrating Ideological Education With Competency Cultivation:Teaching Practices for an Intercultural Communication Course Under the New Liberal Arts Background
8
作者 WU Yuan 《Sino-US English Teaching》 2026年第1期10-16,共7页
This study investigates how to pedagogically integrate ideological education with competency development in the Intercultural Communication course,a challenge arising from China’s dual reform contexts of the New Libe... This study investigates how to pedagogically integrate ideological education with competency development in the Intercultural Communication course,a challenge arising from China’s dual reform contexts of the New Liberal Arts initiative and the national curriculum ideology policy.As global interactions intensify,cultivating foreign language professionals who possess both firm cultural confidence and sophisticated intercultural competence have become a critical educational imperative.This exploratory study investigates how a three-dimensional“Value-Knowledge-Competency”framework can guide the redesign of course content,task design,and assessment to achieve organic fusion.Drawing on qualitative data from a case study,it analyzes specific implementation pathways,synthesizes teacher and student feedback,and discusses the resultant challenges and broader implications for foreign language curriculum reform.The findings suggest that such an integrated approach can effectively synergize value guidance with skill cultivation,though its success hinges on overcoming issues related to pedagogical naturalness,resource allocation,and standardized evaluation. 展开更多
关键词 New Liberal Arts ideological-political education Intercultural communication teaching practice integrated framework
在线阅读 下载PDF
FedCCM:Communication-Efficient Federated Learning via Clustered Client Momentum in Non-IID Settings
9
作者 Hang Wen Kai Zeng 《Computers, Materials & Continua》 2026年第3期1690-1707,共18页
Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different e... Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different edge devices varies significantly.As a result,communication overhead increases,which further slows down the convergence process.To address this challenge,we propose a simple yet effective federated learning framework that improves consistency among edge devices.The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates.In parallel,a global momentum is applied during model aggregation,enabling faster convergence while preserving personalization.This strategy enables efficient propagation of the estimated global update direction to all participating edge devices and maintains alignment in local training,without introducing extra memory or communication overhead.We conduct extensive experiments on benchmark datasets such as Cifar100 and Tiny-ImageNet.The results confirm the effectiveness of our framework.On CIFAR-100,our method reaches 55%accuracy with 37 fewer rounds and achieves a competitive final accuracy of 65.46%.Even under extreme non-IID scenarios,it delivers significant improvements in both accuracy and communication efficiency.The implementation is publicly available at https://github.com/sjmp525/CollaborativeComputing/tree/FedCCM(accessed on 20 October 2025). 展开更多
关键词 Federated learning distributed computation communication efficient momentum clustering non-independent and identically distributed(non-IID)
在线阅读 下载PDF
Cascading failure modeling and survivability analysis of weak-communication underwater unmanned swarm networks
10
作者 Yifan Yuan Xiaohong Shen +3 位作者 Lin Sun Ke He Yongsheng Yan Haiyan Wang 《Defence Technology(防务技术)》 2026年第2期66-82,共17页
Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and env... Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and environmental monitoring.Existing failure models primarily focus on power grids and traffic systems,and don't address the unique challenges of weak-communication UUSNs.In UUSNs,cascading failure present a complex and dynamic process driven by the coupling of unstable acoustic channels,passive node drift,adversarial attacks,and network heterogeneity.To address these challenges,a directed weighted graph model of UUSNs is first developed,in which node positions are updated according to ocean-current-driven drift and link weights reflect the probability of successful acoustic transmission.Building on this UUSNs graph model,a cascading failure model is proposed that integrates a normal-failure-recovery state-cycle mechanism,multiple attack strategies,and routingbased load redistribution.Finally,under a five-level connectivity UUSNs scheme,simulations are conducted to analyze how dynamic topology,network load,node recovery delay,and attack modes jointly affect network survivability.The main findings are:(1)moderate node drift can improve survivability by activating weak links;(2)based-energy routing(BER)outperform based-depth routing(BDR)in harsh conditions;(3)node self-recovery time is critical to network survivability;(4)traditional degree-based critical node metrics are inadequate for weak-communication UUSNs.These results provide a theoretical foundation for designing robust survivability mechanisms in weak-communication UUSNs. 展开更多
关键词 Weak communication Underwater unmanned swarm networks(UUSNs) Link success probability Cascading failure Node self-recovery Survivability analysis
在线阅读 下载PDF
Sum V2V Secrecy Rate Maximization for RIS-Assisted Vehicular Communication Systems with Spectrum Sharing
11
作者 LI Zhiwei LI Demin CHEN Xuemin 《Journal of Donghua University(English Edition)》 2026年第1期68-79,共12页
Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper inv... Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper investigates the security of V2V communications in reconfigurable intelligent surface(RIS)-assisted vehicular communication systems with spectrum sharing.It proposes a three-stage alternating optimization(TSAO)algorithm to address the complex problem of multiple eavesdropped V2V links that reuse the spectrum already occupied by vehicle-toinfrastructure(V2I)links.To solve the mixed-integer and non-convex optimization problem due to coupled variables and complex constraints,the algorithm decomposes the original problem into three easily solvable sub-problems:RIS reflection coefficient optimization,vehicle transmission power optimization,and spectrum sharing optimization.First,the RIS reflection coefficients are optimized by using the penalty convex-concave procedure(CCP)method.Second,the optimal power points are determined in the power optimization sub-problem.Finally,the spectrum sharing optimization sub-problem is constructed as a weighted bipartite graph matching problem and solved by using the optimal matching algorithm.The TSAO algorithm not only maximizes the sum V2V secrecy rate but also ensures the quality-of-service(QoS)requirements of the V2I links.Simulation results validate the superiority of the proposed algorithm and highlight the improvement in the sum V2V secrecy rate achieved by utilizing RIS technology in vehicular communication systems with spectrum sharing. 展开更多
关键词 vehicle-to-vehicle(V2V)communication eavesdropping vehicle reconfigurable intelligent surface(RIS) secrecy rate spectrum sharing
在线阅读 下载PDF
An Empirical Analysis of the Effect of Text-Based Computer-Mediated Communication on Communicative Competence
12
作者 王剑娜 《海外英语》 2016年第8期225-228,共4页
It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on l... It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language. 展开更多
关键词 text-based computer-mediated communication(CMC) second language acquisition(SLA) COMMUNICATIVE compe
在线阅读 下载PDF
Opening Moves Involved in Text-based Computer-Mediated-Communication (CMC) by Chinese Adults
13
作者 李莉华 《海外英语》 2011年第3X期257-258,260,共3页
The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communica... The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings. 展开更多
关键词 computer-mediated communication(CMC) Text-based CMC OPENING MOVES instant message exchanges on line chat sequential model
在线阅读 下载PDF
Brain-Computer-Interface Inspired Communications 被引量:1
14
作者 Honglin Hu Xianfu Chen Tao Jiang 《China Communications》 SCIE CSCD 2022年第2期I0002-I0004,共3页
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail... Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems. 展开更多
关键词 communication communicationS EVERYDAY
在线阅读 下载PDF
The 23rd International Conference on Computer Communication and Networks (ICCCN 2014)
15
《计算机应用研究》 CSCD 北大核心 2013年第11期F0002-F0002,共1页
August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and... August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with 展开更多
关键词 WWW ICCCN 2014 The 23rd International Conference on computer communication and Networks
在线阅读 下载PDF
STUDY AND COMPUTER SIMULATION OF AN ADAPTIVE STATISTIC MODEL FOR MOBILE COMMUNICATION CHANNEL 被引量:1
16
作者 Wang Duanyi Hu Zhengming(Beijing University of Posts and Telecommunications, Beijing 100088) 《Journal of Electronics(China)》 1996年第3期228-234,共7页
An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile c... An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model. 展开更多
关键词 Mobile communication CHANNEL MARKOV MODEL ERROR SEQUENCE computer simulation
在线阅读 下载PDF
Call for Paper--Feature Topic Vol.19, No. 2, 2022 Brain-Computer-Interface Inspired Communications
17
《China Communications》 SCIE CSCD 2021年第6期I0007-I0007,共1页
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail... Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems. 展开更多
关键词 communication communicationS EVERYDAY
在线阅读 下载PDF
On English Communications by Narratives and Computer Games
18
作者 肖红 《海外英语》 2014年第20期280-281,共2页
Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich c... Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games. 展开更多
关键词 communication OPPORTUNITY narratives computer GAME
在线阅读 下载PDF
Anonymity Effects and Implications in the Virtual Environment: From Crowd to Computer-Mediated Communication
19
作者 Zuoming Wang 《Social Networking》 2018年第1期45-62,共18页
Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymi... Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment. 展开更多
关键词 ANONYMITY VIRTUAL Environment computer-Mediated communication SIDE
暂未订购
The computer simulation of the communication system that combines data and power down a common twisted wire pair
20
作者 Alexander Paderin Chye En Un 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第S1期81-83,共3页
A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. A... A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability. 展开更多
关键词 110 The computer simulation of the communication system that combines
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部