Suggested Topics within your search.
Suggested Topics within your search.
- Authorship 2
- Broadcast journalism 2
- Journalism 2
- Mass media 2
- Advertising 1
- African American women journalists 1
- Black people in television broadcasting 1
- Black people on television 1
- Broadcasting 1
- Communication 1
- History 1
- Interviewing on television 1
- Journalistic ethics 1
- LANGUAGE ARTS & DISCIPLINES / Journalism 1
- Moral and ethical aspects 1
- Public relations 1
- Report writing 1
- Reporters and reporting 1
- SOCIAL SCIENCE / Ethnic Studies / African American Studies 1
- SOCIAL SCIENCE / Women's Studies 1
- Stereotypes (Social psychology) in mass media 1
- Television broadcasting of news 1
- Vocational guidance 1
- Women in television broadcasting 1
-
301
Rapid responsive and efficient multi-valued Byzantine consensus scheme
Published 2021-02-01“…Due to the increase of network equipments and the uncertainty of the transmission environment, the message delay is also uncertain, and the asynchronous consensus protocol possesses more advantages.Miller et al proposed the first asynchronous consensus protocol HoneyBadgerBFT in 2016, but its transmission efficiency can be optimized furthermore while achieving high throughput.The broadcast protocol in HoneyBadgerBFT was improved by reducing the message complexity in the broadcast process, and adding optional message request process to achieve rapid response and efficient transmission.…”
Get full text
Article -
302
Woodstock au fil de ses médiations : Les technologies sonores et les mises en scène du live
Published 2022-12-01“…Finally, we closely consider the aforementioned broadcast to describe some of the new possibilities of the staging of liveness that is afforded by the Internet.…”
Get full text
Article -
303
An improved asynchronous energy-saving mechanism for IEEE 802.15.5-based networks
Published 2018-09-01“…The performance analysis and simulation evaluation show that semi-synchronous energy saving saves more than 80% of energy with less than 30% memory cost compared to asynchronous energy saving, and it also improves the time of completing broadcast and the end-to-end delay.…”
Get full text
Article -
304
An optimisation for a two‐round good‐case latency protocol
Published 2023-07-01“…Abstract Byzantine broadcast is a fundamental primitive in distributed computing. …”
Get full text
Article -
305
Research on IPv6+ intelligent backbone network technology
Published 2023-05-01“…The China Media Group backbone network is a key infrastructure that connects the headquarters, data centers, hubs/journalists at home and abroad, and “hundreds cities and thousands of screens” across the country, and IPv6+ is the main technical route of the next-generation IP network.The present situation and challenges of the backbone network of the headquarters were mainly analyzed, the principle, advantages and technical characteristics of the core of IPv6+ were introduced, and how IPv6+ technology adapts to the development of broadcast and television services was discussed.Finally, the conception and suggestion of constructing and deploying the next generation broadcast TV backbone network based on IPv6+ were put forward.It provided a new idea to simplify the protocol and speed up the service opening for the future construction of backbone network of radio and television stations.…”
Get full text
Article -
306
Intermédialité et vulgarisation des savoirs historiques à l’ère de la post-radiophonie : le cas de « Au cœur de l’histoire » (Europe 1)
Published 2015-07-01“…Taking as a case study the program « Au coeur de l'Histoire » (« At the heart of History ») presented by Franck Ferrand and broadcast on the French radio station Europe 1, we show that the context of intermediality creates a specific access to knowledge and appropriation which changes the initial radio experience. …”
Get full text
Article -
307
Le partage culturel au service du développement à l’international de la « culture française »
Published 2016-08-01“…They conclude that within a loose framework, the interoperability of French culture establishes itself through interconnections with a multitude of local cultures and cultural actors and by attracting, enlisting, and engaging the broadest possible audiences.…”
Get full text
Article -
308
An energy balance AODV protocol with multicast route discovery for wireless body area networks
Published 2016-08-01“…In AODV protocol with the dynamic topology networks,the source node S requests a route to an arbitrary destination node D with flooding broadcast the RREQ message,but there is only one destination node sink in a WBAN,other nodes involved in receiving and forwarding RREQ have wasted energy except the nodes on minimum hop count routing.An energy balance AODV protocol with multicast route discovery for wireless body area networks was proposed,it increased the minimum hop count to sink hops,the next hop node to sink next and the node itself has the forwarding capability isforward three parameters in a hello message,and selects neighbors which could reach the sink only to participate in forwarding the RREQ message.This protocol effectively reduces the energy cost of the routing discovery through changing the broadcast to multicast,and prolongs the service life of WBAN with energy balance.The performance analysis and simulation experiment indicate that the proposed protocol is more advantaged than similar EAAODV in the number of RREQ,packet delivery ratio and energy consumption.…”
Get full text
Article -
309
PKI cross-domain authentication scheme based on advanced PBFT algorithm
Published 2020-08-01“…In order to solve the efficiency problem of the existing public key infrastructure cross-domain authentication scheme,a cross-domain authentication model based on the consortium blockchain which has the advantages of distributed and difficult to be tamperd with was proposed.On the one hand,the dynamic join and exit function was added to the practical Byzantine fault tolerant (PBFT) algorithm,the primary node election mode was improved,and the three-stage broadcast was reduced to two-stage broadcast for the reducation of communication overhead.On the other hand,the cross-domain authentication system architecture based on consortium chain was designed,the blockchain certificate format and the cross-domain authentication protocol were presented,the security and efficiency were analyzed.The results shows that in term of security,the proposed model has security attributes such as resisting distributed attacks.In terms of performance,the proposed model has advantages in both computational overhead and communication overhead when it was compared with the existing cross-domain authentication schemes.…”
Get full text
Article -
310
Community Media 2.0: A Report from the ‘Co-Creative Communities’ Forum
Published 2013-12-01“…Participatory digital culture presents major challenges to all traditional media outlets, but it presents very direct challenges to the community broadcast sector, which was established from the outset as local, community-driven and participatory. …”
Get full text
Article -
311
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01“…A simple approach was put forward to check the integrity of broadcast messages. Integrating with one- way-hash chain to authenticate the sender of broadcast messages and a new redundant mechanism to deal with insider at- tacks, a lightweight secure time (LiteST) synchronization protocol was proposed. …”
Get full text
Article -
312
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01“…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
Get full text
Article -
313
Motywy historiozoficzne w twórczości Fiodora Stiepuna
Published 2018-06-01“…In the 1920s, this thinker published a series of ten articles entitled Thoughts on Russia, which attempted to describe the Bolshevik revolution in the broadest possible sociocultural context. Thoughts on Russia are among the first texts interpreting the revolution in historiosophical terms.…”
Get full text
Article -
314
A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks
Published 2014-01-01“…Typically like ad hoc networks, broadcast approach is used for data dissemination. …”
Get full text
Article -
315
STUDY OF THE INFLUENCE OF FACTORS ON THE CONTENT OF RUSSIAN FEDERAL CHANNELS IN THE CONTEXT OF DIGITALIZATION
Published 2021-02-01“…Television is an important social institution that should not only reflect the current situation in society, but also broadcast certain behaviors, culture and values. Television content requires a lot of attention, because now there are significant changes in the individual in the new conditions of digital communication. …”
Get full text
Article -
316
Bus cache-based location privacy protection scheme in the Internet of vehicles
Published 2021-07-01“…To solve the problem of real location leakage when vehicles use location-based service (LBS) on the Internet of vehicles, a location privacy protection scheme based on bus cache was proposed.Firstly, a point of interest (POI) pool was obtained from the LBS provider based on its route information.Then the data in the POI pool was selected form a POI list while driving.Finally, the POI list was broadcast to surrounding private vehicles.After the private vehicle received the broadcast data, it verified the identity of the bus and then stored the POI list in the vehicle’s local cache.When a private vehicle needed to query POI information, it would first retrieve it in the local cache, and if the cache was missed, it would send a query request to the LBS provider using the k-anonymity method.The simulation experiment results show that the proposed scheme can reduce the possibility of leakage of the real location of the private vehicle by reducing the number of communications between the private vehicle and the LBSP, thereby effectively improving the privacy protection level of the private vehicle.…”
Get full text
Article -
317
A Gaussian Variogram‐Based Model of Total Electron Content in the Regional Ionosphere of China
Published 2024-11-01“…Compared to existing models, including BDS‐3 broadcast ionospheric model (BDGIM), GPS broadcast model (Klobuchar), Galileo broadcast model (NeQuickG) and post‐processing Global Ionospheric Map released by IGS (IGSG), the accuracy of IVMP‐SHAKING improves by 6%–52%. …”
Get full text
Article -
318
Los orígenes de la radiodifusión y los modelos de investigación del discurso radiofónico
Published 2024-12-01“… La categorización del discurso radiofónico está determinada por los modelos estructurales sobre los que se articula el primer capítulo de la historia del broadcast, que concluye, finalizada la Segunda Guerra Mundial, con la irrupción de la televisión y la inmediata reestructuración del sistema mediático. …”
Get full text
Article -
319
The application of research in organisational communication
Published 2022-11-01“… As with most other forms of communication, the most pressing problems of organisational communication can be localised within the limits of the two basic human communication prerequisites of anticipation and feedback: establishing the identity and nature of your receiver(s) as a basis for message formulation, and establishing the receiver reaction (in its broadest sense) on the message as a basis for continued communication. …”
Get full text
Article -
320
Exploring communication ethics /
Published 2020Table of Contents: “…An overview of communication ethics -- Philosophical and critical perspectives on communication ethics -- Journalism and broadcasting : content issues -- Journalism and broadcasting : personnel issues -- Journalism and broadcasting : policy issues -- Journalism and broadcasting : privacy issues -- Journalism and broadcasting : accountability issues -- Ethical issues in advertising -- Ethical issues in public relations -- Ethical issues in political communication -- Ethical issues in workplace communication -- Ethical issues in cyberspace and social media.…”
View in OPAC
Book