期刊文献+
共找到45篇文章
< 1 2 3 >
每页显示 20 50 100
Analysis of MP Message Communication in English Majors by Winmax2000a
1
作者 刘县军 《海外英语》 2016年第16期238-240,共3页
Mobile phone(MP in the following) message is used routinely to communicate, yet the discourse analysis of it is relatively undeveloped. This new communication channel merits detailed discourse analysis, especially the... Mobile phone(MP in the following) message is used routinely to communicate, yet the discourse analysis of it is relatively undeveloped. This new communication channel merits detailed discourse analysis, especially the interaction differences among phone users. Using discourse analyze software Winmax2000 a to analyze the interaction code, this paper tries to shed light on the unique features of MP message communication and writing proficiency of English majors. 展开更多
关键词 FREQUENCY MP communication MP message New Media
下载PDF
Encoding-decoding message for secure communication based on adaptive chaos synchronization 被引量:1
2
作者 邢国敬 黄德斌 《Journal of Shanghai University(English Edition)》 CAS 2008年第5期400-404,共5页
In this paper, based on an adaptive chaos synchronization scheme, two methods of encoding-decoding message for secure communication are proposed. With the first method, message is directly added to the chaotic signal ... In this paper, based on an adaptive chaos synchronization scheme, two methods of encoding-decoding message for secure communication are proposed. With the first method, message is directly added to the chaotic signal with parameter uncertainty. In the second method, multi-parameter modulation is used to simultaneously transmit more than one digital message (i.e., the multichannel digital communication) through just a single signal, which switches among various chaotic attractors that differ only subtly. In theory, such a treatment increases the difficulty for the intruder to directly intercept the information, and meanwhile the implementation cost decreases significantly. In addition, numerical results show the methods are robust against weak noise, which implies their practicability. 展开更多
关键词 adaptive chaos synchronization secure communication encoding-decoding message multi-parameter modulation
下载PDF
Digital communication of two-dimensional messages in a chaotic optical system
3
作者 周云 吴亮 朱士群 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2196-2201,共6页
The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity differ... The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly. 展开更多
关键词 digital communication multi-mode laser two-dimensional messages chaotic synchronization
下载PDF
Communicative Social Proximity, a Determinant of Attention to the Message in Organisations
4
作者 Mbiah Anny Flore Tchouta 《Psychology Research》 2020年第5期181-192,共12页
Organisations delude themselves on the fact that the obligation for employees to achieve their goals is the guarantee of a good attention to the managers’message.In order to examine the impact of communicative social... Organisations delude themselves on the fact that the obligation for employees to achieve their goals is the guarantee of a good attention to the managers’message.In order to examine the impact of communicative social proximity on the attention paid to the message in the organizational environment,an experimental study is used in which,through virtual communication,the impact of the affective and cognitive-emotional dimension of the message on the attention paid to the manager’s instructions is explored.It emerges that the closer the employees are to the manager through the non-verbal and verbal dimensions of communication,the more they pay attention to the manager’s message. 展开更多
关键词 communicative social proximity message ATTENTION INSTRUCTION
下载PDF
Opening Moves Involved in Text-based Computer-Mediated-Communication (CMC) by Chinese Adults
5
作者 李莉华 《海外英语》 2011年第3X期257-258,260,共3页
The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communica... The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings. 展开更多
关键词 computer-mediated communication(CMC) Text-based CMC OPENING MOVES instant message exchanges on line chat sequential model
下载PDF
Improving performance of optical fibre chaotic communication by dispersion compensation techniques 被引量:3
6
作者 张建忠 王云才 王安帮 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第9期3264-3269,共6页
This paper numerically investigates the effects of dispersion on optical fibre chaotic communication, and proposes a dispersion compensation scheme to improve the performance of optical fibre chaotic communication sys... This paper numerically investigates the effects of dispersion on optical fibre chaotic communication, and proposes a dispersion compensation scheme to improve the performance of optical fibre chaotic communication system. The obtained results show that the transmitter-receiver synchronization progressively degrades and the signal-to-noise ratio of the recovered message deteriorates as the fibre length increases due to the dispersion accumulation. Two segments of 2.5-km dispersion-compensating fibres are symmetrically placed at both ends of a segment of 245-km nonzero dispersionshifted fibre with low dispersion in one compensation period. The numerical results show that the signal-to-noise ratio of the extracted 1 GHz sinusoidal message is improved from -2.92 dB to 15.38 dB by this dispersion compensation for the transmission distance of 500 km. 展开更多
关键词 chaotic communication fibre propagation chaotic synchronization message extraction semiconductor laser dispersion compensation.
下载PDF
Health Communication Framing: The Contribution of Weiner's Attribution Theory 被引量:1
7
《Journalism and Mass Communication》 2013年第5期269-280,共12页
Message framing has been shown to influence the persuasiveness of health communications. In this conceptual paper, the authors suggest that message framing can be extended to include causal attributions, and Weiner's... Message framing has been shown to influence the persuasiveness of health communications. In this conceptual paper, the authors suggest that message framing can be extended to include causal attributions, and Weiner's Attribution Theory (Weiner's AT) is an appropriate theoretical framework for the study of message framing and health communications. Weiner's AT proposes a specific motivational sequence that may explain cognitive, emotional, and behavioral responses to message frames. Propositions regarding relationships between message frames, causal attributions, and emotional and behavioral responses are presented to guide future research. The implications of this attribution-based message-framing process for future research are discussed 展开更多
关键词 message framing health communications attribution theory PERSUASION
下载PDF
Optimization of Communication for Commanding and Controlling Systems
8
作者 BAI Jun-hai (Department of Automation, Xiamen University, Xiamen 361005, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期242-,共1页
This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da t... This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da ta System which was developed to meet the requirements for controlling every fir e nodes, through which Army can achieve their campaign and tactical goals. The c ourse of dealing with communication message mainly include Emery’s situation rep orted, Message change (generally referred to taxis and how to choice best ways), Fire distribute, Evaluating for enemy’s casualty, cooperation among all fire no des, etc. The primary focus for this paper is how to deal with overall throughp ut, message latency, immunity from transmission errors, terrain effects on links and jamming. The system must balance all of these factors to provide within lit tle delay and that some messages are received with a specified time, finally we can make all fire nodes have best control in order to realize the aim of make th is system more optimized. 展开更多
关键词 communication message fire nodes transmission OPTIMIZATION
下载PDF
Half Vector Message Pipelining Optimization of Barrier Synchronization Problems
9
作者 韩天舒 胡铭曾 +1 位作者 李晓明 丁雪梅 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1999年第1期50-53,共4页
Communication optimization is very important for imporoving performance of parallel programs A communication optimization method called HVMP(Half Vector Message Ripelining) is presented. In comparison with the widelyu... Communication optimization is very important for imporoving performance of parallel programs A communication optimization method called HVMP(Half Vector Message Ripelining) is presented. In comparison with the widelyused vector message pipelining, HVMP can get better tradeoff between reducing and hiding communication overhead,and eliminate the communication barrier of barrier synchronization problems[1]. For parallel Systems with low bandwidth such as cluster of workstations and barrier synchronization problems with large amount of communication, HVMPmethod can get good performance. 展开更多
关键词 Data parallel BARRIER synchronization communication OPTIMIZATION method HALF VECTOR message PIPELINING
下载PDF
Health communication campaigns: A brief introduction and call for dialogue
10
作者 Xiaoquan Zhao 《International Journal of Nursing Sciences》 CSCD 2020年第S01期11-15,共5页
This article provides a brief introduction to health communication campaigns as an important method for health promotion.The general approach to campaign development is described and patterns of campaign effects acros... This article provides a brief introduction to health communication campaigns as an important method for health promotion.The general approach to campaign development is described and patterns of campaign effects across behavioral contexts are noted.Several high-profile campaigns in the United States are presented as examples and key learnings from each campaign are highlighted.The roles of theory,as well as major types of theories commonly used in campaign research,are also discussed.The article urges greater efforts to document and understand diverse campaign experience around the world.(c)2020 The author(s).Published by Elsevier B.V.on behalf of the Chinese Nursing Association.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/). 展开更多
关键词 Behavior change Health communication Health promotion message design United States
下载PDF
Research on a New Communication Architecture
11
作者 Li Xiaofeng Shou Biao & Zheng Shirong(Dept. of Computer ScienceUnly. of Set. & Tee. of ChinaHefei, Anhui 230027) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1995年第3期41-48,共8页
Active message is an efficient and versatile communication architecture. The high performance ofit is closely related to the choices made in implementing. This paper discusses the mechanism of active message and consi... Active message is an efficient and versatile communication architecture. The high performance ofit is closely related to the choices made in implementing. This paper discusses the mechanism of active message and considerations should be taken in implementation. We propose improvements in method of message reception and buffer management. Programming model and method using active message arc also discussed. 展开更多
关键词 Active message MPP communication overhead
下载PDF
Manufacturing Communication: DCOM-MMS-based Approach for Flexible Manufacturing System
12
作者 周炳海 余传猛 曹永上 《Journal of Donghua University(English Edition)》 EI CAS 2005年第4期36-40,共5页
A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperabil... A design approach of manufacturing communication is presented for flexible manufacturing system in this paper. The primary objective aims at making the flexible manufacturing control system provided with interoperability and reconfigurability. Based on describing manufacturing message specification (MMS) and distributed component object model (DCOM), a client/server manufacturing communication model is built with MMS standard and DCOM middleware, and the communication interfaces between MMS client and MMS server are designed with Microsoft interface definition language (MIDL) and abstract syntax notation one (ASN.1) of MMS services. As a result, DCOM and MMS integration leads to such client/ server communication capabilities independent of different operating systems and manufacturing devices in flexible manufacturing automation environment. Finally, to verify the new design approach, a prototype system of robot control system has been implemented in MS 2000 Server/Professional Operating System and VC++ 6.0 Developer Environments. 展开更多
关键词 Flexible manufacturing system manufacturing message specification distributed object communication protocol control system.
下载PDF
Reporting Corporate Social Responsibility: Using Comparative Messages to Influence Attitudes and Purchase Intentions
13
作者 Jaesub Lee Kwang Hee Kim +1 位作者 Ya-Ching Chang Robert L. Heath 《Journalism and Mass Communication》 2012年第6期649-666,共18页
This study examined whether exposure to a firm's report of corporate social responsibility (CSR) activities affected attitudes toward the firm and increased behavioral intent to purchase products and services from ... This study examined whether exposure to a firm's report of corporate social responsibility (CSR) activities affected attitudes toward the firm and increased behavioral intent to purchase products and services from it. Findings showed that increased knowledge of a company's CSR deeds fosters positive attitudes and favorable purchase intentions toward the company. Reports that compared the firm's CSR activities to the competitor's activities favorably affected consumers' attitudes and purchase intentions positively. On the other hand, self-promotional reports affected neither attitudes nor purchase intentions significantly. 展开更多
关键词 corporate social responsibility (CSR) communicating CSR self-promotion message social comparisonmessage ATTITUDES purchase intentions
下载PDF
Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm
14
作者 Emmanuel Nwabueze Ekwonwune Victor Chibunna Enyinnaya 《Journal of Software Engineering and Applications》 2020年第3期25-40,共16页
The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on M... The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java. 展开更多
关键词 Encryption HYBRID Security Integrity Authentication Vulnerability Cryptography Short message Service (SMS) Global System for Mobile communication (GSM) message DIGEST 5 (MD5) BLOWFISH and Rivest-Shamir Adleman (RSA)
下载PDF
An On-Line Scheduler over Hard Real-Time Communication System
15
作者 CHEN Hui XIONG Guangze(School of Computer Science and Engineering,UESTC Chengdu 610054 China) 《Journal of Electronic Science and Technology of China》 2003年第1期47-53,共7页
By thorough research on the prominent periodic and aperiodic scheduling algorithms,anon-line hard real-time scheduler is presented,which is applicable to the scheduling of packets over a link.This scheduler,based on b... By thorough research on the prominent periodic and aperiodic scheduling algorithms,anon-line hard real-time scheduler is presented,which is applicable to the scheduling of packets over a link.This scheduler,based on both Rate Monotonic,pinwheel scheduling algorithm Sr and Polling Serverscheduling algorithms,can rapidly judge the schedulability and then automatically generate a bus tablefor the scheduling algorithm to schedule the packets as the periodic packets.The implementation of thescheduler is simple and easy to use,and it is effective for the utilization of bus link.The orderly executionof the bus table can not only guarantee the performance of the hard real time but also avoid the blockageand interruption of the message transmission.So the scheduler perfectly meets the demand of hard real-time communication system on the field bus domain. 展开更多
关键词 hard real-time communication advanced real-time communication scheduler(ARTCS) on-line scheduler bus scheduling table message
下载PDF
High-capacity device-independent quantum secure direct communication based on hyper-encoding
16
作者 Hui Zeng Ming-Ming Du +2 位作者 Wei Zhong Lan Zhou Yu-Bo Sheng 《Fundamental Research》 CAS CSCD 2024年第4期851-857,共7页
Quantum secure direct communication(QSDC)can directly transmit secret messages through quantum channel without keys.Device-independent(DI)QSDC guarantees the message security relying only on the observation of the Bel... Quantum secure direct communication(QSDC)can directly transmit secret messages through quantum channel without keys.Device-independent(DI)QSDC guarantees the message security relying only on the observation of the Bell-inequality violation,but not on any detailed description or trust of the devices'inner workings.Compared with conventional QSDC,DI-QSDC has relatively low secret message capacity.To increase DI-QSDC's secret messages capacity,we propose a high-capacity DI-QSDC protocol based on the hyper-encoding technique.The total message leakage rate of our DI-QSDC protocol only relies on the most robust degree of freedom.We provide the numerical simulation of its secret message capacity altered with the communication distance.Our work serves as an important step toward thefurther development of DI-QSDC systems. 展开更多
关键词 Quantum cryptography Device-independent Quantum secure direct communication Hyper-encoding Hyperentangled Bell state measurement Secret message capacity
原文传递
MIND THE GAP: TOWARDS AND BEYOND IMPACT MESSAGING TO ENHANCE TROPICAL CYCLONE RISK COMMUNICATION 被引量:1
17
作者 PETER OTTO AMISHA MEHTA BROOKE LIU 《Tropical Cyclone Research and Review》 2018年第2期140-151,共12页
Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to e... Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to each of these groups. For the general public, effective risk communication requires that technical information be translated to first gain attention and build understanding of risk, and then continue to be exchanged by all parties. The World Meteorological Organization and its partner agencies have recognised this need for translated information by moving away from warnings describing risks solely in terms of meteorological parameters and towards clearer messaging emphasizing significance and potential impacts. While the move towards more relatable weather warning messaging is a positive one, risk communication is a complex, dynamic and interactive process that is highly dependent on audience psychology, knowledge, skills, and capabilities; presenting at once difficulties and opportunities for agencies. Over recent years, advertisers, politicians and public safety advocates have all improved their messaging through the use of big data, psychology, social networking and behavioural economics principles, yet the links between these elements and weather risk communication are still relatively immature. This report aims to build links between weather forecasters, social scientists and related industries by outlining three conceptual models social scientists have developed to meet different challenges in the field of risk communication; the mental models approach, risk information seeking and processing, and the protective action decision making model. Recent issues and successes in the communication of tropical cyclone risk will then be examined and compared to these models, and future opportunities will be discussed. 展开更多
关键词 RISK communication impact-based WARNINGS IMPACT WARNINGS tropical cyclone RISK messagING models of RISK communication public safety social media
原文传递
地震台站无线远程监控及3G备用信道方案实现 被引量:6
18
作者 孙宏志 刘一萌 +4 位作者 王学成 卢山 赵龙梅 孙恺微 高业欣 《防灾减灾学报》 2014年第1期45-49,共5页
介绍了一稳定可靠的地震台站无线远程监控及3G备用信道方案的实现,其是基于GSM(全球移动通信系统)网络3G(第三代移动通信技术)和SMS(短信业务)的方案。当有线信道出现故障时,中心人员可通过SMS(短信业务)指令对其控制切换并启动无线备... 介绍了一稳定可靠的地震台站无线远程监控及3G备用信道方案的实现,其是基于GSM(全球移动通信系统)网络3G(第三代移动通信技术)和SMS(短信业务)的方案。当有线信道出现故障时,中心人员可通过SMS(短信业务)指令对其控制切换并启动无线备用信道,当有线信道恢复后,通过指令关闭无线信道并切换至有线信道进行地震数据传输。具有通过3G无线传输测震数据的功能。 展开更多
关键词 GSM (全球移动通信系统) SMS (短信业务) 3G (第三代移动通信技术) 短信 GSM ( Global System for MOBILE communication) SMS ( Short message Service) 3G (third generation MOBILE communication technology)
下载PDF
The Design and Implementation of IPCMechanism in Mach Operating System
19
作者 赵晓慧 王建国 舒华 《Journal of Beijing Institute of Technology》 EI CAS 1998年第1期100-106,共7页
Aim To design the home -made embedded real time operating system COSIX V2.O/RT developing platform,the Mach operating system interprocess communication mech- anism based on object-oriented technique was analyzed. Met... Aim To design the home -made embedded real time operating system COSIX V2.O/RT developing platform,the Mach operating system interprocess communication mech- anism based on object-oriented technique was analyzed. Methods Not only being the trans-mission channel,but also being the abstract of all the entity in the Mach operating system.ports play the most important role in Mach IPC(interprocess communication).Ports were de-vided into 4 types: system ports, privileged ports user ports and kernel ports.All these ports'creation,run and kill processes and the message transmission in IPC were analyzed.ResultsMach IPC has been widely used in Client/Server run environment.Packing and unpacking inmessage transmission must restrict the run efficiency of IPC Conclusion To enhance IPC runefficiency and at the same time enhance the operating system's run efficiency,some of thesystem calls should be rewritten and implemented with trapped mode in kernel.In the end the aim of designing real time operating system is achieved. 展开更多
关键词 PORT message TASK communication
下载PDF
EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR 被引量:7
20
作者 Yang Haomiao Huang Rongshun +2 位作者 Wang Xiaofen Deng Jiang Chen Ruidong 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2014年第3期688-696,共9页
Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-gen... Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link. 展开更多
关键词 Air traffic management Broadcast authentication Identity-based signature message recovery Satellite communication
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部