Suggested Topics within your search.
Suggested Topics within your search.
- Authorship 2
- Broadcast journalism 2
- Journalism 2
- Mass media 2
- Advertising 1
- African American women journalists 1
- Black people in television broadcasting 1
- Black people on television 1
- Broadcasting 1
- Communication 1
- History 1
- Interviewing on television 1
- Journalistic ethics 1
- LANGUAGE ARTS & DISCIPLINES / Journalism 1
- Moral and ethical aspects 1
- Public relations 1
- Report writing 1
- Reporters and reporting 1
- SOCIAL SCIENCE / Ethnic Studies / African American Studies 1
- SOCIAL SCIENCE / Women's Studies 1
- Stereotypes (Social psychology) in mass media 1
- Television broadcasting of news 1
- Vocational guidance 1
- Women in television broadcasting 1
-
541
ANALYSIS OF METHODS TO INCREASE BRAND LOYALTY AMONG RUSSIAN TELEVISION CHANNELS
Published 2019-11-01“…The objects of the study are seven well-known public broadcasters, whose business has established more than twenty-five significant and cost-effective ways to influence the loyalty of the audience. …”
Get full text
Article -
542
Efficient certificateless multi-receiver anonymous signcryption scheme
Published 2016-06-01“…To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was proposed.Furthermore,the security of the scheme in the random oracle was based on the computational Diffie-Hellman assumption and elliptic curve discrete logarithm assumption was proved.Meanwhile,the scheme was free from certificate management center and needed no bilinear paring operation in both signcryption and decryption phases.It can also protect both the sender and receivers’identity from leaking out.So the scheme can be applied conveniently to broadcast signcryption in network environment.…”
Get full text
Article -
543
Al Ababeed : filmer Zénobie comme une héroïne nationale
Published 2023-12-01“…The Syrian television programme Al Ababeed, broadcast in 1997, follows the events that led to the fall of Palmyra and the end of Zenobia's power. …”
Get full text
Article -
544
On-demand cooperative spectrum sensing and channel allocation in cognitive wireless networks
Published 2011-11-01“…Combining of the broadcast feature of control messages in the route discovery and maintenance process,a method to make the mutual information of the spectrum sensing and channel allocation into the route control messages was proposed.The information exchange of cognitive users is started by the route discovery process,and then creates the node cluster for cooperative sensing along the route path,which is maintained by the route maintenance messages.In order to maximize the network capacity of cognitive users,proposed jointly design of the spectrum sensing and the channel allocation.Simulation analysis showed that the overhead of information exchange for cognitive users reduce,and ease the bottleneck effects of the control channel in cognitive wireless networks,meanwhile efficiently re-use the idle spectrum.…”
Get full text
Article -
545
Pratiques de réception des images musicalisées télévisuelles sur les réseaux socionumériques. Analyse des tweets des téléspectateurs de l’émission Les Reines du shopping (M6)...
Published 2019-12-01“…It is based on the thematic and discursive analysis of the tweets broadcast during the French TV show Les Reines du shopping (M6). …”
Get full text
Article -
546
Spectrum Access Algoritbm Based on POMDP Model in CVANET
Published 2014-09-01“…The simulation results show that cognitive vehicle user's access throughput is effectively improved by this algorithm which avoid the happening of broadcast storm and also simplify the calculation.…”
Get full text
Article -
547
Research progress of blockchain network covert channel
Published 2022-09-01“…Characterized by decentration, anonymity, strong robustness and tamper resistance, blockchain accompanied by digital currency is a natural carrier for building the covert communication channel.First, the definition and development history of the network covert channel, the framework of blockchain technology and the traditional network covert channel were introduced and the advantages of the channel in the blockchain were given.Thus, the channel in blockchain was classified on the basis of transaction address, signature algorithm, smart contract and P2P broadcast mechanism.The merits and demerits were analyzed in terms of crypticity, transmission efficiency, and communication costs.Lastly, problems and the future research direction of the network covert channel in blockchain were presented.…”
Get full text
Article -
548
Un cinéma affranchi du contrôle de l’État
Published 2018-10-01“…Parallel to those videos broadcasted on television or posted on social media, a Syrian cinematic creation persists outside the official production channels of the regime and despite difficulties. …”
Get full text
Article -
549
DIGITALIZED YOUTH, KNOWLEDGE GAP, AND DIGITAL DIVIDE: A STUDY ON YOUNGSTERS’ MEDIA USE FOR OBTAINING DAILY NEWS
Published 2016-01-01“…The result shows that the ones who use digital and broadcast media for collecting news and information have more experience of using the Internet. …”
Get full text
Article -
550
Aide-toi, la viralité t’aidera. Ou de la création et diffusion des proverbes dans les médias
Published 2024-12-01“…Thus, I will compare proverbs and virality through contrasting (French-Italian) and interdisciplinary (from biology and virology) approaches, using authentic examples drawn from social media and semi-spontaneous conversations broadcast on radio or television. This study will show not only that virality and proverbs share many features, but also that proverbs can adapt to new realities (which may allow them to evolve in the future without disappearing). …”
Get full text
Article -
551
Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System
Published 2015-01-01“…WiMAX networks are the most suitable for E-Learning through their Broadcast and Multicast Services at rural areas. Authentication of users is carried out by AAA server in WiMAX. …”
Get full text
Article -
552
“Come and find your (love) story”.
Published 2018-05-01“…The main goal of this paper is not only to discuss the methods and techniques chosen by the broadcasters, but also to pay attention to the content that remains (un)intentionally ambiguous.…”
Get full text
Article -
553
Algorithm of route discovery based on distance prediction in MANET
Published 2010-01-01“…A scheme of route discovery was provided based on the distance prediction to destination.Hops table was established to store historical records.The long-range information and instantaneous information were extracted from historical records.The distance to the destination was calculated by weight sum of both long-range information and instantaneous information.By aid of the distance predicted,the optimized parameters of ERS including the initial TTL value,broadcast threshold and step size of ERS were calculated.Simulation results showed that the new scheme significantly improved performance of the protocol under many kinds of simulation scenarios.The routing overhead was saved and the end-to-end delay of the packet was reduced.At the same time,the new scheme was also easy to implement.…”
Get full text
Article -
554
Le discours rapporté dans un corpus d’anglais oral : formes et frontières
Published 2019-12-01“…It contains about 8 hours of audio files (= ca 80,000 words) from various types of documents (political speeches, interviews, news broadcasts, scientific programmes…), most of them recorded from 2004 to 2013. …”
Get full text
Article -
555
Balanced energy-efficient routing algorithm based on smart antenna and dynamic virtual cluster
Published 2013-08-01“…An energy-efficient and energy-consumption-balanced routing,named SaDVC-Routing,was put forward for WSN.The algorithm constructs virtual clusters based on assistant relays in the area of smart antenna beams,and then selects the node with maximum relay weight from the cluster to act as routing relay.With the help of energy consumption and nodes distance information,SaDVC-Routing can dynamically update the virtual clusters with beam expanding.If the beam width exceeds the threshold,a routing request is re-broadcasted based on weighted distance matrix.According to the simulation,it was found that this algorithm could not only decrease the energy consumption,but also get consumption balance between nodes in the local and global area.…”
Get full text
Article -
556
Le docufiction l’Odyssée de l’espèce. Analyse didactique et pistes d’exploitation en classe de terminale S
Published 2013-01-01“…Rather than ignoring these media, whose popularity among young’s has surprised many researchers and broadcasters of the major TV channels, it is of particular interest to present them to students in a critical perspective. …”
Get full text
Article -
557
Attribute-based authenticated key agreement protocol supporting revocation
Published 2014-05-01“…The protocol based on Waters' ciphertext-policy attribute-based encryption and Boneh-Gentry-Waters' broadcast encryption was constructed. In the protocol, revocation can be done immediately without affecting any non-revoked users and does not require users to update keys periodically by interacting with the key authority. …”
Get full text
Article -
558
Research on SSB 1+X beam technology of 5G network
Published 2022-01-01“…Beam scanning and spatial dimensions in 5G was introduced in the 3GPP standard.When UE connects gNodeB, gNodeB uses SSB beam rotation to detect the optimal beam of UE.After UE was connected, the CSI-RS configuration information could be obtained and the CSI could be normal feedback,gNodeB adopted the optimal beam transmitted by the CSI-RS beam in turn.5G antennas flexibly configure the number of beams and take into account coverage in both horizontal and vertical dimensions.The development of broadcast beams and the horizontal 7 beams facing challenges were presented, the horizontal 7 beam and 1+X beam schemes were analyzed.Finally, efficiency was presented.…”
Get full text
Article -
559
Représenter la désobéissance civile par le dessin, Cuadernos del 15M de Enrique Flores
Published 2024-04-01“…Spanish cartoonist Enrique Flores was an actor and witness of the 15M 2011 in Madrid. He produces and broadcasts a graphic report that strikes by its quality and relevance. …”
Get full text
Article -
560
Approximate algorithm for median query based on WSN
Published 2011-01-01“…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
Get full text
Article