Showing 441 - 460 results of 844 for search 'Broadwest~', query time: 3.96s Refine Results
  1. 441

    Research on SSB 1+X beam technology of 5G network by Bei LI, Yuhua HU, Xinyan WANG, Guoping XU, Guanghai LIU, Tian XIAO, Chen CHENG, Yi LI

    Published 2022-01-01
    “…Beam scanning and spatial dimensions in 5G was introduced in the 3GPP standard.When UE connects gNodeB, gNodeB uses SSB beam rotation to detect the optimal beam of UE.After UE was connected, the CSI-RS configuration information could be obtained and the CSI could be normal feedback,gNodeB adopted the optimal beam transmitted by the CSI-RS beam in turn.5G antennas flexibly configure the number of beams and take into account coverage in both horizontal and vertical dimensions.The development of broadcast beams and the horizontal 7 beams facing challenges were presented, the horizontal 7 beam and 1+X beam schemes were analyzed.Finally, efficiency was presented.…”
    Get full text
    Article
  2. 442

    Recent Developments of Reflectarray Antennas in Dual-Reflector Configurations by Carolina Tienda, Manuel Arrebola, José A. Encinar

    Published 2012-01-01
    “…The performance and capabilities of these antennas are shown by describing some practical design cases for radar, satellite communications, and direct broadcast satellite (DBS) applications.…”
    Get full text
    Article
  3. 443

    Pratiques de réception des images musicalisées télévisuelles sur les réseaux socionumériques. Analyse des tweets des téléspectateurs de l’émission Les Reines du shopping (M6)... by Guylaine Gueraud-Pinet

    Published 2019-12-01
    “…It is based on the thematic and discursive analysis of the tweets broadcast during the French TV show Les Reines du shopping (M6). …”
    Get full text
    Article
  4. 444

    Multi-Agent Maritime Traffic Simulator by Luka Grgicevic

    Published 2024-10-01
    “…Vessels are engaged in repeated competitive polymatrix games, whose equilibria solutions are a series of waypoints, meant to be broadcast as navigational decision support by the Vessel Traffic Services. …”
    Get full text
    Article
  5. 445

    L’imagerie irlandaise, du stéréotype au simulacre by Corinne Feïss-Jehel, Pierre-Jérôme Jehel

    Published 2018-12-01
    “…Landscapes and the images of them which are produced, broadcast or marketed, occupy a privileged place in the Irish tourist industry. …”
    Get full text
    Article
  6. 446

    Physical layer security for the air-space-ground communication networks by Shuai HAN, Xiangxue TAI, Weixiao MENG

    Published 2018-03-01
    “…As a typical application of wireless communications,the air-space-ground communications networks are facing serious wireless communications security issues due to its inherent broadcast nature and wide coverage.Especially in the field of military satellite communications,the requirement of secure communications security is even more crucial.How to realize the security of communications is a problem must be faced.A model for physical layer security communication in air-space-ground communication network was proposed which was a cooperative layer-direct connect mixed-to-ground physical layer secure communication model.Based on this model,the security of the system was further improved by studying the relay selection problem and the power distribution problem of satellite and relay,and an overall scheme to enhance the confidentiality of the communication network was also proposed.…”
    Get full text
    Article
  7. 447

    Ce que le livestream fait au live by Romain Bigay

    Published 2022-12-01
    “…With livestream, whose development has accelerated sharply with the Covid19 pandemic, live music is created and broadcast online, via ad hoc technical solutions, but above all via social content sharing platforms. …”
    Get full text
    Article
  8. 448

    Les Souverains Anonymes : des archives carcérales du « dedans » by Simon-Olivier Gagnon, Anne Klein

    Published 2024-01-01
    “…In Quebec since 1989, Souverains Anonymes, a radio programme, has been produced with the inmates of the Montreal detention centre and broadcast on dozens of community radio stations in Quebec, Canada and France. …”
    Get full text
    Article
  9. 449

    Strategy of routing based on layered for underwater wireless sensor networks by Jian PENG, Chang-jian HONG, Tang LIU, GYun-yong ZHAN

    Published 2014-06-01
    “…A layered-depth based routing protocol was proposed for underwater wireless sensor networks (layered-DBR). After nodes broadcast, message only could be received by nodes in predefined depth in order to control the copies of message and finally a network hierarchy model related to redundancy could be built. …”
    Get full text
    Article
  10. 450

    Challenges of political communication with young people on social media by A. A. Komarova

    Published 2022-11-01
    “…In the course of the study, it was important to find out not only which communication and information channels influence the formation of political opinions of modern youth, but also how young people participate in public discussion of topical issues, with the help of which online resources they broadcast their point of view. In order to create effective communication with the youth audience, including in the field of political topics, attention should be paid to how media personalities who are attractive to young people and who can shape the moods and orientations of modern young people form their content, how they communicate, how they convey information.…”
    Get full text
    Article
  11. 451

    Televising the Space Race in Francoist Spain: Sebastià Estradé and the “Friends of Outer Space” (1967-1969) by Gorostiza Santiago

    Published 2024-12-01
    “…This article examines the role of science popularization in this legitimization process by focusing on the TV show Amigos del Espacio (“Friends of Outer Space”), broadcast between 1967 and 1969 and aimed at young audiences. …”
    Get full text
    Article
  12. 452

    Self-healing group key distribution scheme with revocation based on dual directional hash chain by DU Chun-lai1, HU Ming-zeng2, ZHANG Hong-li2, ZHANG Dong-yan2

    Published 2009-01-01
    “…A self-healing group key distribution scheme with revocation in MANET using dual directional hash chain was proposed.The association relation between different session keys was built.By means of broadcast information and own secrets,the legal nodes which lost some legal session keys due to network faults could be capable of recovering such lost session keys on their own,without requiring additional transmission from the group manager.The group manager could revoke the group nodes by revocation polynomial.Node was endowed with a set of masking secret according to its life-cycle.Through the security and efficiency analysis,the key distribution scheme reduces communication cost and storage cost yet still achieves security property.…”
    Get full text
    Article
  13. 453

    Aide-toi, la viralité t’aidera. Ou de la création et diffusion des proverbes dans les médias by Vincenzo Lambertini

    Published 2024-12-01
    “…Thus, I will compare proverbs and virality through contrasting (French-Italian) and interdisciplinary (from biology and virology) approaches, using authentic examples drawn from social media and semi-spontaneous conversations broadcast on radio or television. This study will show not only that virality and proverbs share many features, but also that proverbs can adapt to new realities (which may allow them to evolve in the future without disappearing). …”
    Get full text
    Article
  14. 454

    Le faux-monnayage dans le Puy-de-Dôme du Second Empire à la Belle Époque : du mythe à la réalité by Sébastien Soulier

    Published 2011-12-01
    “…The broadcast (emission, issue) and the counterfeiting money represent only 1,6 % of the business (affairs) judged by the criminal court of Puy-de-Dôme between 1852 and 1914, that is 54 defendants (accused) besides 60 years. …”
    Get full text
    Article
  15. 455

    An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks by Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li

    Published 2019-06-01
    “…Vehicles periodically broadcast traffic-related status messages. Message authentication is a common way for ensuring information reliability, but it is an unaffordable computational cost for single vehicle. …”
    Get full text
    Article
  16. 456

    Random Dissemination Algorithm of Stete-Updating Message for Distributed Virtual Environments of P2P Architecture by Tao Li, Hua Hu, Haiyang Hu

    Published 2014-10-01
    “…With the aim at optimizing view consistency in P2P distributed virtual environments, a random broadcasting algorithm for distributing state-updating message among users was proposed. …”
    Get full text
    Article
  17. 457

    Understanding why teachers entrust technology in innovating the learning outcomes by Sahlan Tampubolon, Lela Susanty, Khasanah Khasanah, Wisman Wisman, Agus Riyanto

    Published 2021-12-01
    “…This study relies on secondary data with a phenomenological approach, exploring the broadest data often done in descriptive qualitative studies of social sciences and humanities. …”
    Get full text
    Article
  18. 458

    An Appraisal of the Chronology Problem in the “Rise of the West” Question by Gürsu Galip Gürsakal, Sezgin Kaya

    Published 2013-12-01
    “…We do not intend to present a detailed account but just the important milestones delineating only the broadest contours of the discussion. After providing a general overview of the “Rise of the West” literature we dwell upon the “Problem of Chronology” haunting it. …”
    Get full text
    Article
  19. 459

    Lexis of destruction in the Russian and Serbian languages by Krstić Мaja R.

    Published 2024-01-01
    “…The main characteristics of destruction in the broadest sense include: change, deformation, disintegration of something; structural changes under the impact of various forces (physical, mechanical, spontaneous) or humans. …”
    Get full text
    Article
  20. 460

    Evolution by natural selection is a scientific law and not just a theory by Daniel J.M. Crouch, Walter F. Bodmer

    Published 2024-02-01
    “…The developing knowledge of prokaryotic microorganisms and the discovery of DNA or RNA as the fundamental basis of inheritance in all living organisms, together with Mendel’s laws, now provide the four basic conditions for evolution by natural selection, namely reproduction that is stable, but allows for variation that can increase fitness in the broadest sense. These definitive conditions establish an exponential growth law for evolution by natural selection that applied initially for the longest period of time to the evolution of asexual clonal organisms, and through Mendel's laws, extends to bisexual multicellular organisms. …”
    Get full text
    Article