Suggested Topics within your search.
Suggested Topics within your search.
- Authorship 2
- Broadcast journalism 2
- Journalism 2
- Mass media 2
- Advertising 1
- African American women journalists 1
- Black people in television broadcasting 1
- Black people on television 1
- Broadcasting 1
- Communication 1
- History 1
- Interviewing on television 1
- Journalistic ethics 1
- LANGUAGE ARTS & DISCIPLINES / Journalism 1
- Moral and ethical aspects 1
- Public relations 1
- Report writing 1
- Reporters and reporting 1
- SOCIAL SCIENCE / Ethnic Studies / African American Studies 1
- SOCIAL SCIENCE / Women's Studies 1
- Stereotypes (Social psychology) in mass media 1
- Television broadcasting of news 1
- Vocational guidance 1
- Women in television broadcasting 1
-
601
The Preferred User: How Audio Description could Change Understandings of Australian Television Audiences and Media Technology
Published 2018-07-01“…Audio description continues to be unavailable on broadcast television in Australia, despite the technological capabilities to provide it and the existence of a federally funded back catalogue or ‘secret library’ of audio described television content. …”
Get full text
Article -
602
Interference coexistence between wireless meter reading system in 470~510 MHz band and adjacent systems
Published 2017-01-01“…Current RF specification restrains the wireless meter reading system (WMRS) working in 470~510 MHz band.It is incapable of meeting new communication speed and coverage requirements of power network.Under the premise of ensuring that prior used communication systems in adjacent band work without interference,how to modify the related RF specification to improve communication ability of WMRS is one of the problems to be solved at present.Firstly,the domestic frequency spectrum allocation in 450~566 MHz band was analyzed.Then,based on RF parameters of 3 kinds of WMRS from State Grid and deterministic computation and ray tracing simulation method,the interference coexistence between the WMRS and adjacent communication systems,which including broadcast television system,CDMA450 system,railway train dispatching system and FDD-LTE system was studied.At last,some suggestions for revision of relevant RF specifications were obtained.…”
Get full text
Article -
603
2000-2015 : un âge d’or du format webdocumentaire
Published 2024-03-01“…A web documentary or an interactive documentary is a documentary film designed for the web, broadcast on the web and available for viewing on the web. …”
Get full text
Article -
604
Hurricane Preparation: Evacuating Your Home
Published 2005-06-01“…Most of the time these requests and related information will come through radio broadcasts or the local TV station. Different warning methods may be used such as a siren or telephone calls. …”
Get full text
Article -
605
« Est-ce qu’il fait gay ? » : Analyse des questions soulevées lors du casting de comédiens pour des personnages gays dans une websérie
Published 2023-02-01“…In the late 2010’s, the first season of a webseries about LGBT activists was broadcasted for the first time. During the process of casting for the show, the question of what type of comedians should be chosen to embody gay characters arose and a multiplicity of factors played a role in this key decision. …”
Get full text
Article -
606
Ficción televisiva y estereotipos (inter)nacionales : un acercamiento imagológico a El Ministerio del Tiempo (2015-2016)
Published 2018-03-01“…From an imagological perspective, this paper focuses on the first two seasons of El Ministerio del Tiempo, a TV series broadcasted in 2015-2016 by the Spanish Radio and Television Corporation (RTVE). …”
Get full text
Article -
607
Googling the US Electoral Cycle, 2004-2016: South African Insights
Published 2020-03-01“…This represents a potential 16.5% of total local broadcast TV advertising revenue for 2020. Digital media is forecast for 21% of political ads, cable TV 14% and radio nearly 5%” (Adgate, 2019). …”
Get full text
Article -
608
Writing, rewriting and revisiting the Cold War in Tom Stoppard’s Squaring the Circle. Poland 1980-81 (1984)
Published 2022-01-01“…Poland 1980-81, which was broadcast on Channel 4 in May 1984. The play is one of several of his plays on the Cold War. …”
Get full text
Article -
609
Can Tics be Performed Convincingly by an Actor?
Published 2014-01-01“…While the movie was broadcasted in German cinemas, we put an online survey (including 28 questions on different aspects related to the observation, performance, and authenticity of tics) on the web pages of the German self-help group. 276/296 surveys submitted could be used for further analyses. …”
Get full text
Article -
610
Standardising Creativity. Analytical Tools for the Study of Clay Figurines in the Mediterranean and Near East
Published 2022-03-01“…From 6 to 10 April 2021, the 12th International Congress on the Archaeology of the Ancient Near East (ICAANE) took place remotely and was broadcast from the University of Bologna, Italy. Within the conference, Barbara Bolognani and Nadeshda Bladt Knudsen organized a workshop entitled “Standardising Creativity. …”
Get full text
Article -
611
Investigation of The Factors Affecting The Banking Preferences of Public Employees Using Advertisements Through Mixed Method
Published 2024-04-01“…In this study, exploratory survey design, which is one of the mixed methods, was used to determine the factors affecting the banking preferences of the public employees. 36 commercials of 9 banks broadcast on television were used as qualitative data. …”
Get full text
Article -
612
Research on real-time fusion method of multi-source heterogeneous flight trajectory data stream
Published 2020-09-01“…Secondary surveillance radar (SSR) and automatic dependent surveillance-broadcast (ADS-B) are the two main surveillance methods coexisting in the airspace surveillance system.In order to improve the accuracy and stability of surveillance,real-time fusion of SSR and ADS-B trajectory is crucial.In view of the fact that the existing methods are difficult to meet the real-time fusion requirements of large-scale trajectories,a real-time fusion method of SSR and ADS-B data streams was designed with big data technology.This method was based on the big data processing framework of micro-batch processing and followed the MapReduce programming model.While obtaining a fusion trajectory of high quality,it ensured high concurrency and real-time data processing capability of the system.Finally,a real-time flight simulation experiment based on real flight data was carried out to verify the feasibility of the method.…”
Get full text
Article -
613
Reporting What’s Going on at the Neighbors from a Distance: Turkish News Channels’ Breaking News Coverage of the 2018 Missile Strikes against Syria
Published 2021-06-01“…On the other hand,there was a lack of diversity and balance in the use of sources. For instance, no broadcast journalistsreflected the opinions of Syrian refugees living in Turkey, and very few reported from anywhere nearthe scene of the action. …”
Get full text
Article -
614
Methods to Reduce Forest Residue Volume after Timber Harvesting and Produce Black Carbon
Published 2017-01-01“…Pile burning is currently used on many forest sites as the preferred method for residue disposal because piles can be burned at various times of the year and are usually more controlled than broadcast burns. In many cases, fire can be beneficial to site conditions and soil properties, but slash piles, with a large concentration of wood, needles, forest floor, and sometimes mineral soil, can cause long-term damage. …”
Get full text
Article -
615
Wild Wild West : une série au carrefour des affirmations dans les États-Unis du milieu des années 1960
Published 2020-02-01“…The Television series The Wild Wild West (WWW) was broadcast on CBS from 1965 to 1969 and it was an immediate success. …”
Get full text
Article -
616
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01“…Many services and applications in vehicular ad-hoc networks (VANET) require preserving and secure data communications.To improve driving safety and comfort,the traffic-related status information will be broadcasted regularly and shared among drivers.Without the security and privacy guarantee,attackers could track their interested vehicles by collecting and analyzing their traffic messages.Hence,anonymous message authentication is an essential requirement of VANET.On the other hand,when a vehicle is involved in a dispute event of warning message,the certificate authority should be able to recover the real identity of this vehicle.To deal with this issue,Guo,et al proposed a new privacy-preserving authentication protocol with authority traceability using elliptic curve based chameleon Hashing.Although this scheme has vehicle identification traceability and high computational efficiency than the previous plan,but analysis shows that the scheme does not meet the anonymity.The security of Guo's scheme is analyzed and improvement is made based on Guo’s protocol.…”
Get full text
Article -
617
Legal Protection For Book Piracy Traded Through Marketplaces In Indonesia
Published 2024-11-01“…Introduction: According to Law Number 28 of 2014 concerning Copyright, an act is considered a Copyright violation if it violates the exclusive rights of the creator, which includes the right to publish or reproduce his work and the right to give permission or prohibit other people from doing so. create, reproduce or broadcast it without their consent. Purposes of the Research: This research aims to analyze how the law accommodates the protection of book piracy cases in the marketplace which is easy to do. …”
Get full text
Article -
618
CCA-secure verifiable Mix-Net protocol
Published 2015-10-01“…A CCA-secure verifiable Mix-Net protocol with provable security was proposed.The protocol was based on Wikström’s Mix-Net and improves its security by introducing an improved key generation algorithm and a new method for constructing proof of secret shuffling.Without revealing the correspondence between inputs and outputs,proposed protocol enables everyone to verify the correctness of output plaintexts through checking evidences broadcasted by each server.Thus,it satisfies public verifiability.Any sender can trace and examine the processing procedure of its ciphertext.Thus,proposed protocol satisfies sender verifiability.It is prored to be CCA-secure under the assumption of random oracle.Compared with previous mix-net schemes which are CCA-secure,proposed protocol does not require any trusted center,and incurs fewer interactions between servers which also resulting in a lower computation and communication complexity.Hence,the protocol is an ideal cryptographic tool for constructing secure electronic election protocol.…”
Get full text
Article -
619
Direction des sociétés, modèle de reproduction des élites managériales et financiarisation du capitalisme allemand : Enseignements à partir d’un panel de vingt-cinq sociétés cotées...
Published 2010-12-01“…The aim of this paper is to evaluate the impact of the foreign Institutional Investors arrival in the German quoted firms’ capital structure, and the broadcast of the “Shareholder Value” discourse, on the social reproduction process of the German managerial Elites. …”
Get full text
Article -
620
Direct localization algorithm of the aerial target based on external radiation source
Published 2023-06-01“…In order to improve the accuracy of aerial target location and ensure its concealment, a direct location algo-rithm of the aerial target based on external radiation source was proposed.Fixed broadcast signals were used as transmit-ting sources, and the signals scattered by the aerial targets were received by multiple receivers.A direct relationship be-tween the synchronized multi-dimensional baseband signals and the position coordinates of the target was established, and then the spatial cross-spectrum function and joint matching function were constructed.Through iterative spectral peak search, the positioning results of the aerial target could be optimized, and the impact of direct signals and multipath signals on the ground could be effectively suppressed.Simulation results show that the performance of the proposed al-gorithm is better than that of the traditional two-step localization method and other direct localization methods in the case of low signal-to-noise ratio (SNR), and it can achieve high-precision localization of the three-dimensional mobile target.…”
Get full text
Article