Police Communication Systems
نویسندگان
چکیده
منابع مشابه
Secure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملModeling Lateral Communication in Holonic Multi Agent Systems
Agents, in a multi agent system, communicate with each other through the process of exchanging messages which is called dialogue. Multi agent organization is generally used to optimize agents’ communications. Holonic organization demonstrates a self-similar recursive and hierarchical structure in which each holon may include some other holons. In a holonic system, lateral communication occurs b...
متن کاملHeuristic Evaluation of Picture Archiving and Communication Systems (PACS)
Introduction: Poor User Interface design can be one of the probable reasons of users’ error and reduced incentive in using health information systems such as PACS. Heuristic evaluation is one the methods for assuring the proper user interface design of health information systems such as PACS. Method: This study was a descriptive-analytic research conducted in 2019 through using Nielsen usabilit...
متن کاملHeuristic Evaluation of Picture Archiving and Communication Systems (PACS)
Introduction: Poor User Interface design can be one of the probable reasons of users’ error and reduced incentive in using health information systems such as PACS. Heuristic evaluation is one the methods for assuring the proper user interface design of health information systems such as PACS. Method: This study was a descriptive-analytic research conducted in 2019 through using Nielsen usabilit...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Criminal Law and Criminology (1931-1951)
سال: 1938
ISSN: 0885-2731
DOI: 10.2307/1137169