Showing 541 - 560 results of 753 for search '"broadcasting"', query time: 0.05s Refine Results
  1. 541

    ANALYSIS OF METHODS TO INCREASE BRAND LOYALTY AMONG RUSSIAN TELEVISION CHANNELS by M. Nemirovskaya, V. Yakusheva

    Published 2019-11-01
    “…The objects of the study are seven well-known public broadcasters, whose business has established more than twenty-five significant and cost-effective ways to influence the loyalty of the audience. …”
    Get full text
    Article
  2. 542

    Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU

    Published 2016-06-01
    “…To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was proposed.Furthermore,the security of the scheme in the random oracle was based on the computational Diffie-Hellman assumption and elliptic curve discrete logarithm assumption was proved.Meanwhile,the scheme was free from certificate management center and needed no bilinear paring operation in both signcryption and decryption phases.It can also protect both the sender and receivers’identity from leaking out.So the scheme can be applied conveniently to broadcast signcryption in network environment.…”
    Get full text
    Article
  3. 543

    Al Ababeed : filmer Zénobie comme une héroïne nationale by Thomas Richard

    Published 2023-12-01
    “…The Syrian television programme Al Ababeed, broadcast in 1997, follows the events that led to the fall of Palmyra and the end of Zenobia's power. …”
    Get full text
    Article
  4. 544

    On-demand cooperative spectrum sensing and channel allocation in cognitive wireless networks by Bao-gang LI, Yuan-an LIU, Kai-ming LIU

    Published 2011-11-01
    “…Combining of the broadcast feature of control messages in the route discovery and maintenance process,a method to make the mutual information of the spectrum sensing and channel allocation into the route control messages was proposed.The information exchange of cognitive users is started by the route discovery process,and then creates the node cluster for cooperative sensing along the route path,which is maintained by the route maintenance messages.In order to maximize the network capacity of cognitive users,proposed jointly design of the spectrum sensing and the channel allocation.Simulation analysis showed that the overhead of information exchange for cognitive users reduce,and ease the bottleneck effects of the control channel in cognitive wireless networks,meanwhile efficiently re-use the idle spectrum.…”
    Get full text
    Article
  5. 545

    Pratiques de réception des images musicalisées télévisuelles sur les réseaux socionumériques. Analyse des tweets des téléspectateurs de l’émission Les Reines du shopping (M6)... by Guylaine Gueraud-Pinet

    Published 2019-12-01
    “…It is based on the thematic and discursive analysis of the tweets broadcast during the French TV show Les Reines du shopping (M6). …”
    Get full text
    Article
  6. 546

    Spectrum Access Algoritbm Based on POMDP Model in CVANET by Xuefei Zhang, Guoan Zhang, Yancheng Ji

    Published 2014-09-01
    “…The simulation results show that cognitive vehicle user's access throughput is effectively improved by this algorithm which avoid the happening of broadcast storm and also simplify the calculation.…”
    Get full text
    Article
  7. 547

    Research progress of blockchain network covert channel by Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO

    Published 2022-09-01
    “…Characterized by decentration, anonymity, strong robustness and tamper resistance, blockchain accompanied by digital currency is a natural carrier for building the covert communication channel.First, the definition and development history of the network covert channel, the framework of blockchain technology and the traditional network covert channel were introduced and the advantages of the channel in the blockchain were given.Thus, the channel in blockchain was classified on the basis of transaction address, signature algorithm, smart contract and P2P broadcast mechanism.The merits and demerits were analyzed in terms of crypticity, transmission efficiency, and communication costs.Lastly, problems and the future research direction of the network covert channel in blockchain were presented.…”
    Get full text
    Article
  8. 548

    Un cinéma affranchi du contrôle de l’État by Nicolas Appelt

    Published 2018-10-01
    “…Parallel to those videos broadcasted on television or posted on social media, a Syrian cinematic creation persists outside the official production channels of the regime and despite difficulties. …”
    Get full text
    Article
  9. 549

    DIGITALIZED YOUTH, KNOWLEDGE GAP, AND DIGITAL DIVIDE: A STUDY ON YOUNGSTERS’ MEDIA USE FOR OBTAINING DAILY NEWS by Serra Çelebi

    Published 2016-01-01
    “…The result shows that the ones who use digital and broadcast media for collecting news and information have more experience of using the Internet. …”
    Get full text
    Article
  10. 550

    Aide-toi, la viralité t’aidera. Ou de la création et diffusion des proverbes dans les médias by Vincenzo Lambertini

    Published 2024-12-01
    “…Thus, I will compare proverbs and virality through contrasting (French-Italian) and interdisciplinary (from biology and virology) approaches, using authentic examples drawn from social media and semi-spontaneous conversations broadcast on radio or television. This study will show not only that virality and proverbs share many features, but also that proverbs can adapt to new realities (which may allow them to evolve in the future without disappearing). …”
    Get full text
    Article
  11. 551

    Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System by Chithra Rajagopal, Kalaavathi Bhuvaneshwaran

    Published 2015-01-01
    “…WiMAX networks are the most suitable for E-Learning through their Broadcast and Multicast Services at rural areas. Authentication of users is carried out by AAA server in WiMAX. …”
    Get full text
    Article
  12. 552

    “Come and find your (love) story”. by Sabina Owsianowska

    Published 2018-05-01
    “…The main goal of this paper is not only to discuss the methods and techniques chosen by the broadcasters, but also to pay attention to the content that remains (un)intentionally ambiguous.…”
    Get full text
    Article
  13. 553

    Algorithm of route discovery based on distance prediction in MANET by LI Shi-bao, HONG Li

    Published 2010-01-01
    “…A scheme of route discovery was provided based on the distance prediction to destination.Hops table was established to store historical records.The long-range information and instantaneous information were extracted from historical records.The distance to the destination was calculated by weight sum of both long-range information and instantaneous information.By aid of the distance predicted,the optimized parameters of ERS including the initial TTL value,broadcast threshold and step size of ERS were calculated.Simulation results showed that the new scheme significantly improved performance of the protocol under many kinds of simulation scenarios.The routing overhead was saved and the end-to-end delay of the packet was reduced.At the same time,the new scheme was also easy to implement.…”
    Get full text
    Article
  14. 554

    Le discours rapporté dans un corpus d’anglais oral : formes et frontières by Sylvie HANOTE

    Published 2019-12-01
    “…It contains about 8 hours of audio files (= ca 80,000 words) from various types of documents (political speeches, interviews, news broadcasts, scientific programmes…), most of them recorded from 2004 to 2013. …”
    Get full text
    Article
  15. 555

    Balanced energy-efficient routing algorithm based on smart antenna and dynamic virtual cluster by Qing-song HU, Li-xin WU, Shen ZHANG, En-jie DING

    Published 2013-08-01
    “…An energy-efficient and energy-consumption-balanced routing,named SaDVC-Routing,was put forward for WSN.The algorithm constructs virtual clusters based on assistant relays in the area of smart antenna beams,and then selects the node with maximum relay weight from the cluster to act as routing relay.With the help of energy consumption and nodes distance information,SaDVC-Routing can dynamically update the virtual clusters with beam expanding.If the beam width exceeds the threshold,a routing request is re-broadcasted based on weighted distance matrix.According to the simulation,it was found that this algorithm could not only decrease the energy consumption,but also get consumption balance between nodes in the local and global area.…”
    Get full text
    Article
  16. 556

    Le docufiction l’Odyssée de l’espèce. Analyse didactique et pistes d’exploitation en classe de terminale S by Yannick Rech, Eric Triquet

    Published 2013-01-01
    “…Rather than ignoring these media, whose popularity among young’s has surprised many researchers and broadcasters of the major TV channels, it is of particular interest to present them to students in a critical perspective. …”
    Get full text
    Article
  17. 557

    Attribute-based authenticated key agreement protocol supporting revocation by Qiang LI, Deng-guo FENG, Li-wu ZHANG

    Published 2014-05-01
    “…The protocol based on Waters' ciphertext-policy attribute-based encryption and Boneh-Gentry-Waters' broadcast encryption was constructed. In the protocol, revocation can be done immediately without affecting any non-revoked users and does not require users to update keys periodically by interacting with the key authority. …”
    Get full text
    Article
  18. 558

    Research on SSB 1+X beam technology of 5G network by Bei LI, Yuhua HU, Xinyan WANG, Guoping XU, Guanghai LIU, Tian XIAO, Chen CHENG, Yi LI

    Published 2022-01-01
    “…Beam scanning and spatial dimensions in 5G was introduced in the 3GPP standard.When UE connects gNodeB, gNodeB uses SSB beam rotation to detect the optimal beam of UE.After UE was connected, the CSI-RS configuration information could be obtained and the CSI could be normal feedback,gNodeB adopted the optimal beam transmitted by the CSI-RS beam in turn.5G antennas flexibly configure the number of beams and take into account coverage in both horizontal and vertical dimensions.The development of broadcast beams and the horizontal 7 beams facing challenges were presented, the horizontal 7 beam and 1+X beam schemes were analyzed.Finally, efficiency was presented.…”
    Get full text
    Article
  19. 559

    Représenter la désobéissance civile par le dessin, Cuadernos del 15M de Enrique Flores by François Malveille

    Published 2024-04-01
    “…Spanish cartoonist Enrique Flores was an actor and witness of the 15M 2011 in Madrid. He produces and broadcasts a graphic report that strikes by its quality and relevance. …”
    Get full text
    Article
  20. 560

    Approximate algorithm for median query based on WSN by LIU Cai-ping1, MAO Jian-xu2, LI Ren-fa1, FU Bin1

    Published 2011-01-01
    “…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
    Get full text
    Article