Showing 661 - 680 results of 753 for search '"broadcasting"', query time: 0.04s Refine Results
  1. 661

    AODV protocol for acoustic-radio integrated network based on location information and energy balance by Nongyu WEI, Zilong JIANG, Fangjiong CHEN

    Published 2023-03-01
    “…., the node uses its position and energy information as the heuristic information to calculate the forwarding probability and broadcast route request (RREQ) packets.When the destination node receives an RREQ packet, it sent an RREP packet to update the pheromone and select the optimal path based on the pheromone.Compared with AODV protocol, AR-AODV protocol has significantly improved the performance in terms of transmission success rate, transmission delay, throughput, energy conversion rate and routing packet forwarding times.…”
    Get full text
    Article
  2. 662

    The appeal of 7de Laan by Nadia van der Merwe

    Published 2022-11-01
    “…It further held its own in the fiercely competitive timeslot of 18:30 during which two other soaps, namely Isidingo (SABC 3)4 and Rhythm City (e.tv), were then broadcast. The soap has also received the Voters’ Choice Award for best soap opera two years’ running at the South African Film and Television Awards, thereby confirming its popularity. …”
    Get full text
    Article
  3. 663

    RADIO JINGLES AND THE DEVELOPMENT OF HEALTHY EATING HABITS AMONG UNIVERSITY STUDENTS by SAMAILA MARIA KYANGCHAT, AYODELE B JOSEPH

    Published 2023-09-01
    “…Thus, efficacy of jingles in the development of healthy eating habit can be maximized by adopting a multi-channel approach, which includes radio broadcasts, social media, and websites. …”
    Get full text
    Article
  4. 664

    Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks by Qiong Zhang

    Published 2016-07-01
    “…Due to the broadcast nature of wireless channel, attacks against wireless sensor networks are much easier to carry out as compared to wired networks. …”
    Get full text
    Article
  5. 665

    Keeping Up with Power/Corruption in a Pandemic: A Study of an Investigative Journalist’s Twitter Handle by Omotayo Omitola

    Published 2021-12-01
    “…InNigeria, studies have confirmed that a lot of investigative reports are found in the traditional media,both broadcast and print, and most of these reports, which are about financial scandals, originate fromgovernment agencies saddled with the responsibility of battling corruption. …”
    Get full text
    Article
  6. 666

    Emilie Oléron Evans, Transferts culturels et historiographie de l'art : le cas de Nikolaus Pevsner (1902-1983) by Émilie Oléron Evans

    Published 2016-03-01
    “…This thesis shows how Pevsner found a place in British culture as editor, broadcaster and art critic, while basing these activities on German models, and how these activities gradually transformed an interpreter of culture into a cultural institution.…”
    Get full text
    Article
  7. 667

    Adébáyọ̀ Fálétí, Icon on Screen by Toluwanimi Ibikunle

    Published 2021-12-01
    “…Long before he became a star film actor, Adébayọ́ Fa ̀ ́leti’s impressive body of works ́ as a poet, theatre artiste, journalist, translator, broadcaster, writer and culture administrator had firmly established his vast knowledge and mastery of Yorùbá language and philosophy. …”
    Get full text
    Article
  8. 668

    IMPORTANCE OF MEDIA EDUCATION FOR YOUNG PEOPLE IN THE FIELD OF FOOD BIOTECHNOLOGY by O. N. Goryacheva, S. A. Goryacheva

    Published 2020-04-01
    “…Position of state institutions and the scientific community regarding genetic engineering, broadcast through the media, indirectly affects the attitude of young people to genetically modified foods. …”
    Get full text
    Article
  9. 669

    PSFCS: Robust Emergency Communications Supporting High Mobility Based on WiMAX MMR Networks by Wen-Kang Jia, Chia-Yao Chen, Yaw-Chung Chen

    Published 2014-04-01
    “…Since it is difficult to fully eliminate the Doppler effect under high speed moving environment, we propose an enhanced CRC-based error correction scheme that carries as much extra segmented frame Check Sequence (FCS) information as subblocks of emergency multicast/broadcast service (MBS) frame, called progressive and selective frame check sequence (PSFCS). …”
    Get full text
    Article
  10. 670

    On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas by Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

    Published 2013-08-01
    “…Conventional WSNs consist of wireless nodes equipped with omnidirectional antennas, which broadcast radio signals in all directions and are consequently prone to the eavesdropping attacks. …”
    Get full text
    Article
  11. 671

    Road Traffic Gesture Autonomous Integrity Monitoring Using Fuzzy Logic by Kwame Owusu Ampadu, Michael Huebner

    Published 2024-12-01
    “…A single GPS sensor connects to each microcontroller that also manages three light-emitting diodes. The ESPNow broadcast feature is used. The system requires no internet service and no large-scale or long-term storage, such as the driving cloud platform, making it backward-compatible with classical vehicles. …”
    Get full text
    Article
  12. 672

    Design and Construction of Automatic Fish Feeder using Atmel 8052 Microcontroller by KO Ojo, OA Benard

    Published 2018-08-01
    “…Test results at the discharge interval of 4hours and dispensing time of 90minutes within 24hours showed that 15kg of feeds were evenly broadcast across the pond of 12cm less amount of feed lost was recorded compare to manual feeding. …”
    Get full text
    Article
  13. 673

    Revocable identity-based proxy re-signature scheme in the standard model by Xiaodong YANG, Yutong LI, Jinli WANG, Tingchun MA, Caifen WANG

    Published 2019-05-01
    “…User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.…”
    Get full text
    Article
  14. 674

    Polycast: A new paradigm for information-centric data delivery in heterogeneous mobile fog networks by Eun-Kyu Lee, Jae-Han Lim, Mario Gerla

    Published 2017-09-01
    “…Say, the destinations and routing mode (e.g. unicast, multicast, or broadcast) are determined by the contexts. Simulation models are used to evaluate the scheme and to determine sensitivity to network variables.…”
    Get full text
    Article
  15. 675
  16. 676
  17. 677

    GA-ARMA Model for Predicting IGS RTS Corrections by Mingyu Kim, Jeongrae Kim

    Published 2017-01-01
    “…Predicted RTS corrections are applied to the broadcast ephemeris, and precise point positioning accuracies are compared. …”
    Get full text
    Article
  18. 678

    Cooperative and Adaptive Network Coding for Gradient Based Routing in Wireless Sensor Networks with Multiple Sinks by M. E. Migabo, T. O. Olwal, K. Djouani, A. M. Kurien

    Published 2017-01-01
    “…Despite its low computational cost, the Gradient Based Routing (GBR) broadcast of interest messages in Wireless Sensor Networks (WSNs) causes significant packets duplications and unnecessary packets transmissions. …”
    Get full text
    Article
  19. 679

    Autonomous Real-Time Smoothness Control for Reliable DDQN-Based UAV Navigation Using Cellular Networks by Ghada Afifi, Yasser Gadallah

    Published 2025-01-01
    “…We propose to utilize broadcast signals from existing cellular networks to practically navigate the UAV from a given source to a destination in urban environments independent of GPS or other transmissible signals. …”
    Get full text
    Article
  20. 680

    The heart attack of the Polish health service: metaphors, arguments, and emotional appeals in political debates by Konrad Juszczyk, Barbara Konat, Małgorzata Fabiszak

    Published 2025-01-01
    “…Our data come from Polish political debates broadcasted during the 2019 pre-election campaign. We test hypotheses about the frequency of the associations between metaphors, arguments and emotional appeals. …”
    Get full text
    Article