Showing 301 - 320 results of 844 for search 'Broadwest~', query time: 3.49s Refine Results
  1. 301

    Rapid responsive and efficient multi-valued Byzantine consensus scheme by Wang ZHOU, Honggang HU, Nenghai YU

    Published 2021-02-01
    “…Due to the increase of network equipments and the uncertainty of the transmission environment, the message delay is also uncertain, and the asynchronous consensus protocol possesses more advantages.Miller et al proposed the first asynchronous consensus protocol HoneyBadgerBFT in 2016, but its transmission efficiency can be optimized furthermore while achieving high throughput.The broadcast protocol in HoneyBadgerBFT was improved by reducing the message complexity in the broadcast process, and adding optional message request process to achieve rapid response and efficient transmission.…”
    Get full text
    Article
  2. 302

    Woodstock au fil de ses médiations : Les technologies sonores et les mises en scène du live by Sergio Pisfil, Jos Mulder

    Published 2022-12-01
    “…Finally, we closely consider the aforementioned broadcast to describe some of the new possibilities of the staging of liveness that is afforded by the Internet.…”
    Get full text
    Article
  3. 303

    An improved asynchronous energy-saving mechanism for IEEE 802.15.5-based networks by Li-yong Yuan, Fei-long Lin, Jun-ke Lv

    Published 2018-09-01
    “…The performance analysis and simulation evaluation show that semi-synchronous energy saving saves more than 80% of energy with less than 30% memory cost compared to asynchronous energy saving, and it also improves the time of completing broadcast and the end-to-end delay.…”
    Get full text
    Article
  4. 304

    An optimisation for a two‐round good‐case latency protocol by Kexin Hu, Zhenfeng Zhang, Kaiwen Guo, Weiyu Jiang, Xiaoman Li, Jiang Han

    Published 2023-07-01
    “…Abstract Byzantine broadcast is a fundamental primitive in distributed computing. …”
    Get full text
    Article
  5. 305

    Research on IPv6+ intelligent backbone network technology by Jianguo LIU, Hao QU, Hongming HUANG, Zhidan ZHU

    Published 2023-05-01
    “…The China Media Group backbone network is a key infrastructure that connects the headquarters, data centers, hubs/journalists at home and abroad, and “hundreds cities and thousands of screens” across the country, and IPv6+ is the main technical route of the next-generation IP network.The present situation and challenges of the backbone network of the headquarters were mainly analyzed, the principle, advantages and technical characteristics of the core of IPv6+ were introduced, and how IPv6+ technology adapts to the development of broadcast and television services was discussed.Finally, the conception and suggestion of constructing and deploying the next generation broadcast TV backbone network based on IPv6+ were put forward.It provided a new idea to simplify the protocol and speed up the service opening for the future construction of backbone network of radio and television stations.…”
    Get full text
    Article
  6. 306

    Intermédialité et vulgarisation des savoirs historiques à l’ère de la post-radiophonie : le cas de « Au cœur de l’histoire » (Europe 1) by Séverine Equoy Hutin

    Published 2015-07-01
    “…Taking as a case study the program « Au coeur de l'Histoire » (« At the heart of History ») presented by Franck Ferrand and broadcast on the French radio station Europe 1, we show that the context of intermediality creates a specific access to knowledge and appropriation which changes the initial radio experience. …”
    Get full text
    Article
  7. 307

    Le partage culturel au service du développement à l’international de la « culture française » by Stela Raytcheva, Gilles Rouet

    Published 2016-08-01
    “…They conclude that within a loose framework, the interoperability of French culture establishes itself through interconnections with a multitude of local cultures and cultural actors and by attracting, enlisting, and engaging the broadest possible audiences.…”
    Get full text
    Article
  8. 308

    An energy balance AODV protocol with multicast route discovery for wireless body area networks by Jin TAN, Yujuan ZHANG

    Published 2016-08-01
    “…In AODV protocol with the dynamic topology networks,the source node S requests a route to an arbitrary destination node D with flooding broadcast the RREQ message,but there is only one destination node sink in a WBAN,other nodes involved in receiving and forwarding RREQ have wasted energy except the nodes on minimum hop count routing.An energy balance AODV protocol with multicast route discovery for wireless body area networks was proposed,it increased the minimum hop count to sink hops,the next hop node to sink next and the node itself has the forwarding capability isforward three parameters in a hello message,and selects neighbors which could reach the sink only to participate in forwarding the RREQ message.This protocol effectively reduces the energy cost of the routing discovery through changing the broadcast to multicast,and prolongs the service life of WBAN with energy balance.The performance analysis and simulation experiment indicate that the proposed protocol is more advantaged than similar EAAODV in the number of RREQ,packet delivery ratio and energy consumption.…”
    Get full text
    Article
  9. 309

    PKI cross-domain authentication scheme based on advanced PBFT algorithm by Sijie QIAN, Liquan CHEN, Shihui WANG

    Published 2020-08-01
    “…In order to solve the efficiency problem of the existing public key infrastructure cross-domain authentication scheme,a cross-domain authentication model based on the consortium blockchain which has the advantages of distributed and difficult to be tamperd with was proposed.On the one hand,the dynamic join and exit function was added to the practical Byzantine fault tolerant (PBFT) algorithm,the primary node election mode was improved,and the three-stage broadcast was reduced to two-stage broadcast for the reducation of communication overhead.On the other hand,the cross-domain authentication system architecture based on consortium chain was designed,the blockchain certificate format and the cross-domain authentication protocol were presented,the security and efficiency were analyzed.The results shows that in term of security,the proposed model has security attributes such as resisting distributed attacks.In terms of performance,the proposed model has advantages in both computational overhead and communication overhead when it was compared with the existing cross-domain authentication schemes.…”
    Get full text
    Article
  10. 310

    Community Media 2.0: A Report from the ‘Co-Creative Communities’ Forum by Edmond Maura

    Published 2013-12-01
    “…Participatory digital culture presents major challenges to all traditional media outlets, but it presents very direct challenges to the community broadcast sector, which was established from the outset as local, community-driven and participatory. …”
    Get full text
    Article
  11. 311

    LiteST: a lightweight secure time synchronization protocol for wireless sensor networks by YIN Xiang-lan, QI Wang-dong

    Published 2009-01-01
    “…A simple approach was put forward to check the integrity of broadcast messages. Integrating with one- way-hash chain to authenticate the sender of broadcast messages and a new redundant mechanism to deal with insider at- tacks, a lightweight secure time (LiteST) synchronization protocol was proposed. …”
    Get full text
    Article
  12. 312

    Coding-aware secure routing for multi-hop wireless networks by Xian GUO, Tao FENG, Zhan-ting YUAN

    Published 2012-06-01
    “…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
    Get full text
    Article
  13. 313

    Motywy historiozoficzne w twórczości Fiodora Stiepuna by Marcin Ziomek

    Published 2018-06-01
    “…In the 1920s, this thinker published a series of ten articles entitled Thoughts on Russia, which attempted to describe the Bolshevik revolution in the broadest possible sociocultural context. Thoughts on Russia are among the first texts interpreting the revolution in historiosophical terms.…”
    Get full text
    Article
  14. 314

    A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks by Zeeshan Shafi Khan, Mohammed Morsi Moharram, Abdullah Alaraj, Farzana Azam

    Published 2014-01-01
    “…Typically like ad hoc networks, broadcast approach is used for data dissemination. …”
    Get full text
    Article
  15. 315

    STUDY OF THE INFLUENCE OF FACTORS ON THE CONTENT OF RUSSIAN FEDERAL CHANNELS IN THE CONTEXT OF DIGITALIZATION by A. R. Akopyan, A. M. Arakelyan, Yu. V. Vorontsova, V. V. Krysov

    Published 2021-02-01
    “…Television is an important social institution that should not only reflect the current situation in society, but also broadcast certain behaviors, culture and values. Television content requires a lot of attention, because now there are significant changes in the individual in the new conditions of digital communication. …”
    Get full text
    Article
  16. 316

    Bus cache-based location privacy protection scheme in the Internet of vehicles by Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG

    Published 2021-07-01
    “…To solve the problem of real location leakage when vehicles use location-based service (LBS) on the Internet of vehicles, a location privacy protection scheme based on bus cache was proposed.Firstly, a point of interest (POI) pool was obtained from the LBS provider based on its route information.Then the data in the POI pool was selected form a POI list while driving.Finally, the POI list was broadcast to surrounding private vehicles.After the private vehicle received the broadcast data, it verified the identity of the bus and then stored the POI list in the vehicle’s local cache.When a private vehicle needed to query POI information, it would first retrieve it in the local cache, and if the cache was missed, it would send a query request to the LBS provider using the k-anonymity method.The simulation experiment results show that the proposed scheme can reduce the possibility of leakage of the real location of the private vehicle by reducing the number of communications between the private vehicle and the LBSP, thereby effectively improving the privacy protection level of the private vehicle.…”
    Get full text
    Article
  17. 317

    A Gaussian Variogram‐Based Model of Total Electron Content in the Regional Ionosphere of China by Ang Liu, Zishen Li, Ningbo Wang, Ang Li, Zhouyu Zhang, Yunlong Zhang

    Published 2024-11-01
    “…Compared to existing models, including BDS‐3 broadcast ionospheric model (BDGIM), GPS broadcast model (Klobuchar), Galileo broadcast model (NeQuickG) and post‐processing Global Ionospheric Map released by IGS (IGSG), the accuracy of IVMP‐SHAKING improves by 6%–52%. …”
    Get full text
    Article
  18. 318

    Los orígenes de la radiodifusión y los modelos de investigación del discurso radiofónico by Josep V. Gavaldà Roca, Diego Mollá Furió, Nel·lo Pellisser Rossell

    Published 2024-12-01
    “… La categorización del discurso radiofónico está determinada por los modelos estructurales sobre los que se articula el primer capítulo de la historia del broadcast, que concluye, finalizada la Segunda Guerra Mundial, con la irrupción de la televisión y la inmediata reestructuración del sistema mediático. …”
    Get full text
    Article
  19. 319

    The application of research in organisational communication by Gustav Puth

    Published 2022-11-01
    “… As with most other forms of communication, the most pressing problems of organisational communication can be localised within the limits of the two basic human communication prerequisites of anticipation and feedback: establishing the identity and nature of your receiver(s) as a basis for message formulation, and establishing the receiver reaction (in its broadest sense) on the message as a basis for continued communication. …”
    Get full text
    Article
  20. 320

    Exploring communication ethics / by Bobbitt, Randy, 1955-

    Published 2020
    Table of Contents: “…An overview of communication ethics -- Philosophical and critical perspectives on communication ethics -- Journalism and broadcasting : content issues -- Journalism and broadcasting : personnel issues -- Journalism and broadcasting : policy issues -- Journalism and broadcasting : privacy issues -- Journalism and broadcasting : accountability issues -- Ethical issues in advertising -- Ethical issues in public relations -- Ethical issues in political communication -- Ethical issues in workplace communication -- Ethical issues in cyberspace and social media.…”
    View in OPAC
    Book