Showing 421 - 440 results of 844 for search 'Broadwest~', query time: 4.18s Refine Results
  1. 421

    The need for adequate argumentation for the protection of biotic community by Marcin Klimski

    Published 2016-12-01
    “…Among the ethical ideas which are developed in this context, the holistic view presents the broadest scope of human moral responsibility for the natural world. …”
    Get full text
    Article
  2. 422

    FATF in Combating the Financing of Terrorism by K. S. Melkumyan

    Published 2014-02-01
    “…It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. …”
    Get full text
    Article
  3. 423

    Un « opéra radiophonique » : Ariane de Georges Delerue et Michel Polac by Jérôme Rossi

    Published 2014-10-01
    “…Conceived expressly for the radio, the opera begs several questions linked to its being a broadcast: the notion of purely “vocal characters”, the role of silence, and the link with and use of technology. …”
    Get full text
    Article
  4. 424

    Algorithm of route discovery based on distance prediction in MANET by LI Shi-bao, HONG Li

    Published 2010-01-01
    “…A scheme of route discovery was provided based on the distance prediction to destination.Hops table was established to store historical records.The long-range information and instantaneous information were extracted from historical records.The distance to the destination was calculated by weight sum of both long-range information and instantaneous information.By aid of the distance predicted,the optimized parameters of ERS including the initial TTL value,broadcast threshold and step size of ERS were calculated.Simulation results showed that the new scheme significantly improved performance of the protocol under many kinds of simulation scenarios.The routing overhead was saved and the end-to-end delay of the packet was reduced.At the same time,the new scheme was also easy to implement.…”
    Get full text
    Article
  5. 425

    On-demand cooperative spectrum sensing and channel allocation in cognitive wireless networks by Bao-gang LI, Yuan-an LIU, Kai-ming LIU

    Published 2011-11-01
    “…Combining of the broadcast feature of control messages in the route discovery and maintenance process,a method to make the mutual information of the spectrum sensing and channel allocation into the route control messages was proposed.The information exchange of cognitive users is started by the route discovery process,and then creates the node cluster for cooperative sensing along the route path,which is maintained by the route maintenance messages.In order to maximize the network capacity of cognitive users,proposed jointly design of the spectrum sensing and the channel allocation.Simulation analysis showed that the overhead of information exchange for cognitive users reduce,and ease the bottleneck effects of the control channel in cognitive wireless networks,meanwhile efficiently re-use the idle spectrum.…”
    Get full text
    Article
  6. 426

    A distributed adaptive local searching algorithm for wireless sensor network localization by Oscar Osvaldo Saldaña Hernández, Juan Cota-Ruiz, Rafael Gonzalez-Landaeta, Ernesto Sifuentes

    Published 2016-10-01
    “…The new position of a sensor is broadcast to neighboring sensors allowing collaboratively to other sensors re-estimate their new positions. …”
    Get full text
    Article
  7. 427

    A Self-Adaptive Back-Off Algorithm Based on Collision Probability and Expiration Probability of Beacons in VANET by Weiwan Liu, Zhijia Chen, Nanjie Liu, Hao Zhong, Haitao Zhao

    Published 2014-03-01
    “…In order to improve the broadcast reception rate in VANET, the conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size were reached by building Markov model. …”
    Get full text
    Article
  8. 428

    Talking about an emergency in an urgent situation: prosody and information by Charlotte Danino

    Published 2016-07-01
    “…Based on CNN’s live broadcast on 9/11, linguistic productions are analyzed as spontaneous but heavily constrained speech since the breaking news format and both the temporal and cognitive pressures shape the ensuing utterances about this still ongoing event. …”
    Get full text
    Article
  9. 429

    Spectrum Access Algoritbm Based on POMDP Model in CVANET by Xuefei Zhang, Guoan Zhang, Yancheng Ji

    Published 2014-09-01
    “…The simulation results show that cognitive vehicle user's access throughput is effectively improved by this algorithm which avoid the happening of broadcast storm and also simplify the calculation.…”
    Get full text
    Article
  10. 430

    Key management scheme with private key self-healing ability in DTN by De-quan LI, Xi-yong ZHANG, Ting-ting ZHANG, Guan-jun GUO

    Published 2017-04-01
    “…Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing clustering key was management scheme.The scheme can not only accomplish the distribution of the private keys of node and update,but also can self-heal the old time private keys.Security and efficiency analysis show that the scheme is particularly suitable for large network latency,intermittent connection DTN network.…”
    Get full text
    Article
  11. 431

    The Art of Co-Creative Media: An Australian Survey by Spurgeon Christina

    Published 2013-12-01
    “…It then discusses the role of community arts and cultural development (CACD) practitioners and networks as co-creative media intermediaries, and then considers their influence in Australian broadcast and Internet media. It looks at how participatory storytelling methods are evolving in the Australian context and explores some of the implications for cultural inclusion arising from a shared interest in ‘co-creative’ media methods and approaches.…”
    Get full text
    Article
  12. 432

    DIGITALIZED YOUTH, KNOWLEDGE GAP, AND DIGITAL DIVIDE: A STUDY ON YOUNGSTERS’ MEDIA USE FOR OBTAINING DAILY NEWS by Serra Çelebi

    Published 2016-01-01
    “…The result shows that the ones who use digital and broadcast media for collecting news and information have more experience of using the Internet. …”
    Get full text
    Article
  13. 433

    Life storytelling at the ABC: Challenges of ‘giving the audience a voice’ in the context of public service media by Mackay Sasha, Heck Elizabeth

    Published 2015-10-01
    “…Life storytelling projects have become an important means through which public service media institutions such as the Australian Broadcasting Corporation are seeking to foster audience participation and involve particular cohorts in the creation and distribution of broadcast content. …”
    Get full text
    Article
  14. 434

    Application of Image Denoising Method Based on Two-Way Coupling Diffusion Equation in Public Security Forensics by Yiqun Wang, Changpeng He, Zhenjiang Li

    Published 2021-01-01
    “…This paper uses the web live broadcast and on-demand platform based on the B/S architecture as the application side and designs a video image forensic system that can meet multiple police types and multiple application scenarios. …”
    Get full text
    Article
  15. 435

    Un arrière-plan essentiel, la question de la sécurité dans la série Maria Vandamme by Isabelle Veyrat-Masson

    Published 2024-12-01
    “…The television series, Maria Vandamme, was broadcast in 1989 and was a hit with audiences. It received numerous awards for its portrayal of the four-part adaptation of Jacques Duquesne's book, set during the Second Empire and concluding with La Commune de Paris. …”
    Get full text
    Article
  16. 436

    Exact SNR and SIR analysis in Poisson wireless networks by G.P. Efthymoglou, P.S. Bithas, A.G. Kanatas

    Published 2017-03-01
    “…The analytical expressions are given in terms of the Meijer G‐function and reveal the impact of node spatial density, transmit power, interference power, and path‐loss exponent on the connectivity probability of a broadcast wireless transmission. The analytical results are validated with computer simulation.…”
    Get full text
    Article
  17. 437

    Les documentaires politiques de Robert Greenwald : définir des nouvelles pratiques militantes à l’ère d’Internet by Delphine Letort

    Published 2014-02-01
    “…Brave New Films relies on its website to promote an alternative informational space, calling for Internet viewers’ collaboration to help broadcast the films and stir up public debates on issues that hardly ever hit the other media headlines.…”
    Get full text
    Article
  18. 438

    Attribute-based authenticated key agreement protocol supporting revocation by Qiang LI, Deng-guo FENG, Li-wu ZHANG

    Published 2014-05-01
    “…The protocol based on Waters' ciphertext-policy attribute-based encryption and Boneh-Gentry-Waters' broadcast encryption was constructed. In the protocol, revocation can be done immediately without affecting any non-revoked users and does not require users to update keys periodically by interacting with the key authority. …”
    Get full text
    Article
  19. 439

    L’activisme en communication dans la télénovela Órfãos da Terra by Laure Guillot Farneti

    Published 2024-12-01
    “…The first telenovela focusing on contemporary immigration to Brazil, Orfãos da Terra was broadcast between April 27th and September 2, 2019, under Jair Bolsonaro’s far-right government (2019-2023). …”
    Get full text
    Article
  20. 440

    Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU

    Published 2016-06-01
    “…To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was proposed.Furthermore,the security of the scheme in the random oracle was based on the computational Diffie-Hellman assumption and elliptic curve discrete logarithm assumption was proved.Meanwhile,the scheme was free from certificate management center and needed no bilinear paring operation in both signcryption and decryption phases.It can also protect both the sender and receivers’identity from leaking out.So the scheme can be applied conveniently to broadcast signcryption in network environment.…”
    Get full text
    Article