Academic literature on the topic 'Broadcast Control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Broadcast Control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Broadcast Control"

1

Belen, Selma, C. Yalçin Kaya, and C. E. M. Pearce. "Impulsive control of rumours with two broadcasts." ANZIAM Journal 46, no. 3 (January 2005): 379–91. http://dx.doi.org/10.1017/s1446181100008324.

Full text
Abstract:
AbstractIn this paper we introduce an impulsive control model of a rumour process. The spreaders are classified as subscriber spreaders, who receive an initial broadcast of a rumour and start spreading it, and nonsubscriber spreaders who change from being an ignorant to being a spreader after encountering a spreader. There are two consecutive broadcasts. The first starts the rumour process. The objective is to time the second broadcast so that the final proportion of ignorants is minimised. The second broadcast reactivates as spreaders either the subscriber stiflers (Scenario 1) or all individuals who have been spreaders (Scenario 2). It is shown that with either scenario the optimal time for the second broadcast is always when the proportion of spreaders drops to zero.
APA, Harvard, Vancouver, ISO, and other styles
2

LIPMAN, JUSTIN, PAUL BOUSTEAD, and JOHN JUDGE. "NEIGHBOR AWARE ADAPTIVE POWER FLOODING (NAAP) IN MOBILE AD HOC NETWORKS." International Journal of Foundations of Computer Science 14, no. 02 (April 2003): 237–52. http://dx.doi.org/10.1142/s0129054103001704.

Full text
Abstract:
This paper introduces Neighbor Aware Adaptive Power flooding, an optimized flooding mechanism used in mobile ad hoc networks (MANETS) that employs several mechanisms (neighbor coverage, power control, neighbor awareness and local optimization) to limit the broadcast storm problem, reduce duplicate packet reception and lower power consumption in both transmission and reception. Upon receiving an optimized broadcast, a relay determines a new set of possible relays (to continue the flood) based upon local neighbor information and the previous optimized broadcast. Additionally, neighboring relays only consider the shared neighbors they are closest to. A relay may perform local optimization (to reduce power consumption and isolate broadcasts) by substituting one high power broadcast with two or more low power broadcasts, thereby introducing additional hops, We show that compared to blind flooding and multipoint relaying, NAAP in a static environment greatly reduces the problems associated with the broadcast storm problem, duplicate packet reception and power consumption.
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Linsheng, Linghe Kong, Kayhan Zrar Ghafoor, Guihai Chen, and Shahid Mumtaz. "LAB: Lightweight Adaptive Broadcast Control in DSRC Vehicular Networks." Wireless Communications and Mobile Computing 2018 (August 13, 2018): 1–10. http://dx.doi.org/10.1155/2018/5713913.

Full text
Abstract:
The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. The vehicular ad hoc networks (VANETs) are a typical application of IIoT. Benefiting from Dedicated Short-Range Communication (DSRC) technology, vehicles can communicate with each other through wireless manner. Therefore, road safety is able to be greatly improved by the broadcast of safety messages, which contain vehicle’s real-time speed, position, direction, etc. In existing DSRC, safety messages are broadcasted at a fixed frequency by default. However, traffic conditions are dynamic. In this way, there are too many transmission collisions when vehicles are too dense and the wireless channel is underused when vehicles are too sparse. In this paper, we address broadcast congestion issue in DSRC and propose lightweight adaptive broadcast (LAB) control for DSRC safety message. The objectives of LAB are to make full use of DSRC channel and avoid congestion. LAB meets two key challenges. First, it is hard to adopt a centralized method to control the communication parameters of distributed vehicles. Furthermore, the vehicle cannot easily acquire the channel conditions of other vehicles. To overcome these challenges, channel condition is attached with safety messages in LAB and broadcast frequency is adapted according to neighboring vehicles’ channel conditions. To evaluate the performance of LAB, we conduct extensive simulations on different roads and different vehicle densities. Performance results demonstrate that LAB effectively adjusts the broadcast frequency and controls the congestion.
APA, Harvard, Vancouver, ISO, and other styles
4

Zeng, Fanzi, Yuting Tang, and Jianjie Pu. "Multichannel Broadcast Based on Home Channel for Cognitive Radio Sensor Networks." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/725210.

Full text
Abstract:
Considering the limited resources and the dynamic spectrum distribution in the cognitive radio sensor networks (CRSN), a half-duplex Multichannel broadcast protocol for CRSN is presented based on the home channel. This protocol maintains the networks topology only through the home channel, so there is no need for the public channel to transmit the control information and no need for the synchronization. After network initialization, node broadcasts data via home channel in half-duplex transmission way. The simulation results show that, compared with complete broadcast, the proposed protocol effectively reduces broadcast delay and overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Rivest, R. "Network control by Bayesian broadcast." IEEE Transactions on Information Theory 33, no. 3 (May 1987): 323–28. http://dx.doi.org/10.1109/tit.1987.1057315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mohamad Nor, Mohamad Hafizulazwan, Zool Hilmi Ismail, and Mohd Ashraf Ahmad. "Broadcast control of multi-robot systems with norm-limited update vector." International Journal of Advanced Robotic Systems 17, no. 4 (July 1, 2020): 172988142094595. http://dx.doi.org/10.1177/1729881420945958.

Full text
Abstract:
This article addresses a problem in standard broadcast control framework which leads to an unstable solution in a certain motion-coordination task. First, the unstable phenomenon in a certain motion-coordination task is illustrated using standard broadcast control framework. This issue calls for modification to the standard broadcast control framework by limiting the norm of the update vector of robots’ positions into a constant value. Then, we demonstrate that the modified broadcast controller achieves the convergence with the probability of 1. Finally, we illustrate in numerical simulations that the modified broadcast controller can effectively solve the instability issue and also may improve the convergence time as compared to the standard broadcast controller.
APA, Harvard, Vancouver, ISO, and other styles
7

AU, MEI-WAI, EDWARD CHAN, and KAM-YIU LAM. "CONCURRENCY CONTROL FOR MOBILE SYSTEMS WITH DATA BROADCAST." Journal of Interconnection Networks 02, no. 03 (September 2001): 253–67. http://dx.doi.org/10.1142/s0219265901000361.

Full text
Abstract:
Although data broadcast has been shown to be an efficient method for disseminating data items in a mobile computing system with large number of clients, the issue on how to ensure the data consistency observed by mobile transactions, which are generated by mobile clients, has been largely ignored by researchers in the area. While data items are being broadcast, update transactions may install new values for the data items. If the executions of update and broadcast of data items are interleaved without any control, the mobile transactions may observe inconsistent data values. In this paper, we propose a serialization checking method (SCM) for concurrency control between read-only mobile transactions and update transactions. SCM is based on the framework of an earlier algorithm, Update First with Ordering (UFO), but improves on that algorithm by reducing re-broadcast overhead when the probability of data conflict between updates and data broadcast is high. Simulation experiments have been performed to investigate the performance characteristics of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
8

Shanmugasundaram, Jayavel, Arvind Nithrakashyap, Rajendran Sivasankaran, and Krithi Ramamritham. "Efficient concurrency control for broadcast environments." ACM SIGMOD Record 28, no. 2 (June 1999): 85–96. http://dx.doi.org/10.1145/304181.304190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Azuma, Shun-ichi, Ryota Yoshimura, and Toshiharu Sugie. "Broadcast control of multi-agent systems." Automatica 49, no. 8 (August 2013): 2307–16. http://dx.doi.org/10.1016/j.automatica.2013.04.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cristian, Flaviu. "Synchronous atomic broadcast for redundant broadcast channels." Real-Time Systems 2, no. 3 (September 1990): 195–212. http://dx.doi.org/10.1007/bf00365327.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Broadcast Control"

1

Liu, Sisi. "Securing Wireless Broadcast Communications against Internal Attacks." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/228114.

Full text
Abstract:
The pervasiveness of wireless communications in modern society is unprecedent. Using numerous wireless technologies, including cellular, WiFi, WiMax and others, users gain ubiquitous access to a wealth of information services relevant to their everyday lives. These include communication services (voice, email, text), commercial transactions (e-banking, e-trading), location-based services (points of interest, navigation), social networking, web access, and others. Further proliferation of mobile services and applications provided via wireless communications is contingent upon the network's reliability and security. As this wireless revolution continues to unfold, users have grown increasingly concerned with the amount of sensitive information that leaks to unauthorized parties. They have also become more skeptical to the abilities of current technologies in providing a reliable and secure environment. The problem of ensuring network reliability and security is particularly challenging in the wireless domain. The open nature of the wireless medium leaves it accessible to any device equipped with a transceiver. Wireless networks remain vulnerable to numerous attacks, including eavesdropping, packet modification and injection, replay, impersonation, and jamming. Moreover, the poor physical security of the majority of wireless stations (mobile devices, sensor, etc.) makes them susceptible to physical compromise. Such compromised devices become a launchpad for internal attacks from adversaries with intimate knowledge of network secrets and protocol specifications. Internal attacks are much harder to counter than external ones since the adversary can bypass typical cryptographic methods that authorize user access. In this dissertation, we investigate attacks on wireless communications launched by internal adversaries. In particular, we are concerned with sophisticated intentional interference (jamming) attacks against broadcast communications. Such attacks have been shown to be detrimental to network operation. We further consider the problem of distributed node coordination in dynamic spectrum networks. To address these problems, we design novel communication protocols that protect broadcast communications from internal attacks via a combination of randomization, redundancy and cryptographic techniques. We propose new security metrics to quantify the ability of the adversary to deny access to the broadcast channel. We introduce a randomized distributed scheme that allows nodes to establish and maintain the broadcast channel in the presence of the jammer. Also this scheme uniquely identifies the set of compromised nodes, both when nodes are acting independently and when they are colluding. To protect broadcast communication performed on control channel, we propose a secure broadcast scheme called TDBS, which implements the broadcast operation as a series of unicast transmissions, distributed in frequency and time. Finally, we address the problem of dynamically assigning the control channel in CRNs based on time- and space-varying spectrum opportunities. We propose a cluster-based architecture that allocates different channels for control at various clusters in the network. The clustering problem is formulated as a bipartite graph problem, for which we develop a class of algorithms to implement. Extensive simulations are conducted to verify the validity of the proposed mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
2

Allen, Hamilton Ross. "Distribution and Management of the Red Imported Fire Ant, Solenopsis invicta Buren, in Virginia." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/35125.

Full text
Abstract:
Red imported fire ant specimens were first collected in Virginia in 1989 from colonies located in Hampton, Va. Now colonies are established throughout the Hampton Roads area of Virginia. Because the fire ant is a new pest information regarding the distribution, biology, and management of the ant in Virgnia are absent. Therefore studies were conducted to compare the efficacies of four broadcast fire ant control products and an individual mound treatment to control fire ants and to determine the impact of Advion and Top Choice on non-target ant species. Additionally, twenty-six fire ant colonies in Virginia were sampled to determine colony social form and to detect biological control organisms. Lastly, the CLIMEX model was used to predict the potential spread of the fire ant in Virginia.

Field trials showed that combination applications of Advion and Top Choice provided the fastest and greatest reduction in foraging three days after treatment and the longest residual control of fire ant colonies for one year. Field tests documenting the impacts of Advion and Top Choice on non-target ants indicate treatments do supress ant foraging but ant populations will rebound 10-12 months after treatment.

Laboratory PCR assays revealed that colonies in Virginia are primarily polygyne. Also, Kneallhazia solenopsae, Pseudaction spp. parasitoid decapitating phorid flies, and Solenopsis invicta virues (SINV) genetic materials were detected in fire ant samples. CLIMEX model results indicate that fire ants will be able to spread as far east as the Greater Richmond area and as far north as Alexandria in Virginia.
Master of Science in Life Sciences

APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Xiaohan Sasha. "Investigation of Forward Error Correction Coding Schemes for a Broadcast Communication System." Thesis, University of Canterbury. Computer Science and Software Engineering, 2013. http://hdl.handle.net/10092/7902.

Full text
Abstract:
This thesis investigates four FEC (forward error correction) coding schemes for their suitability for a broadcast system where there is one energy-rich transmitter and many energy-constrained receivers with a variety of channel conditions. The four coding schemes are: repetition codes (the baseline scheme); Reed-Solomon (RS) codes; Luby-Transform (LT) codes; and a type of RS and LT concatenated codes. The schemes were tested in terms of their ability to achieve both high average data reception success probability and short data reception time at the receivers (due to limited energy). The code rate (Rc) is fixed to either 1/2 or 1/3. Two statistical channel models were employed: the memoryless channel and the Gilbert-Elliott channel. The investigation considered only the data-link layer behaviour of the schemes. During the course of the investigation, an improvement to the original LT encoding process was made, the name LTAM (LT codes with Added Memory) was given to this improved coding method. LTAM codes reduce the overhead needed for decoding short-length messages. The improvement can be seen for decoding up to 10000 number of user packets. The maximum overhead reduction is as much as 10% over the original LT codes. The LT-type codes were found to have the property that can both achieve high success data reception performance and flexible switch off time for the receivers. They are also adaptable to different channel characteristics. Therefore it is a prototype of the ideal coding scheme that this project is looking for. This scheme was then further developed by applying an RS code as an inner code to further improve the success probability of packet reception. The results show that LT&RS code has a significant improvement in the channel error tolerance over that of the LT codes without an RS code applied. The trade-off is slightly more reception time needed and more decoding complexity. This LT&RS code is then determined to be the best scheme that fulfils the aim in the context of this project which is to find a coding scheme that both has a high overall data reception probability and short overall data reception time. Comparing the LT&RS code with the baseline repetition code, the improvement is in three aspects. Firstly, the LT&RS code can keep full success rate over channels have approximately two orders of magnitude more errors than the repetition code. This is for the two channel models and two code rates tested. Secondly, the LT&RS code shows an exceptionally good performance under burst error channels. It is able to maintain more than 70% success rate under the long burst error channels where both the repetition code and the RS code have almost zero success probability. Thirdly, while the success rates are improved, the data reception time, measured in terms of number of packets needed to be received at the receiver, of the LT&RS codes can reach a maximum of 58% reduction for Rc = 1=2 and 158% reduction for Rc = 1=3 compared with both the repetition code and the RS code at the worst channel error rate that the LT&RS code maintains almost 100% success probability.
APA, Harvard, Vancouver, ISO, and other styles
4

Shirazi, Hamidreza. "Cooperating broadcast and cellular conditional access system for digital television." Thesis, Brunel University, 2009. http://bura.brunel.ac.uk/handle/2438/3758.

Full text
Abstract:
The lack of interoperability between Pay‐TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay‐TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay‐TV systems. This paper presents a novel end‐to‐end system architecture for Pay‐TV systems cooperating mobile and broadcasting technologies. It provides a cost‐effective, scalable, dynamic and secure access control mechanism supporting converged services and new business opportunities in Pay‐TV systems. It enhances interactivity, security and potentially reduces customer attrition and operational cost. In this platform, service providers can effectively interact with their customers, personalise their services and adopt appropriate security measures. It breaks up the rigid relationship between a viewer and set‐top box as imposed by traditional conditional access systems, thus, a viewer can fully enjoy his entitlements via an arbitrary set‐top box. Having thoroughly considered state‐of‐the‐art technologies currently being used across the world, the thesis highlights novel use cases and presents the full design and implementation aspects of the system. The design section is enriched by providing possible security structures supported thereby. A business collaboration structure is proposed, followed by a reference model for implementing the system. Finally, the security architectures are analysed to propose the best architecture on the basis of security, complexity and set‐top box production cost criteria.
APA, Harvard, Vancouver, ISO, and other styles
5

Fryman, Daisy M. "COMPARISON OF ROPE-WICK AND BROADCAST TREATMENTS FOR CONTROL OF CANADA THISTLE AND TALL IRONWEED." UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_theses/586.

Full text
Abstract:
Tall ironweed (Vernonia altissima) and Canada thistle (Cirsium arvense) control in cool season grass pastures was evaluated in 2007 and 2008. Tall ironweed was evaluated in Fayette and Boone Counties, KY and Canada thistle was evaluated at Spindletop Research Farm. Herbicides applied selectively with a rope-wick were compared to a broadcast foliar spray. Treatments were a broadcast treatment, of aminopyralid + 2, 4-D and six rope-wick treatments: aminopyralid at three concentrations, glyphosate, triclopyr and clopyralid at one concentration each. The Boone County location had five broadcast foliar treatments: aminopyralid at three rates, triclopyr + fluroxpyr, and 2,4-D + triclopyr. The Canada thistle study consisted of the same six rope-wick treatments as the Fayette County tall ironweed study. A broadcast treatment of aminopyralid at 70 g a.e./ha was included in 2008. Studies were evaluated 1, 2, 3, 4, 8 and 52 weeks after treatment. Aminopyralid plus 2,4-D provided 86% control of tall ironweed 52 WAT. Aminopyralid at 20% v/v controlled 65% of tall ironweed. Canada thistle control 52 WAT ranged from 0 to 25% control for the six ropewick treatments.
APA, Harvard, Vancouver, ISO, and other styles
6

Sharman, Kimberly. "A broadcast-based coordination scheme for a system of autonomous mobile robots." Thesis, Virginia Tech, 1994. http://hdl.handle.net/10919/42057.

Full text
Abstract:
A method for coordinating a homogeneous swarm of autonomous mobile robots is presented. The broadcast-based coordination scheme was developed for the Army Ant swarm—a system of small, relatively inexpensive mobile robots that can accomplish complex tasks by cooperating as a team. The primary drawback of the Army Ant system is that the absence of a central supervisor poses difficulty in the coordination and control of the agents. Our coordination scheme provides a global "group dynamic" that controls the actions of each robot using only local interactions. Coordination of the swarm is achieved with signals we call "heartbeats". Each agent broadcasts a unique heartbeat and responds to the collective behavior of all other heartbeats. We generate heartbeats with van der Pol oscillators, which are nonlinear oscillators that modify their output when coupled to other oscillators. Van der Pol oscillators have long been utilized in simulations, particularly to model rhythmic behavior in biological systems. In this application, we use the known properties of coupled van der Pol oscillators to create predictable group behavior. We emphasize the use of this controller to allow agents to simultaneously perform an action such as lifting, steering, or changing speed. For this research we synthesize a three oscillator network to show that we can achieve multi-agent coordination. An inexpensive FM communication link is used to broadcast and receive oscillator signals. We show that the network may be configured to entrain to a leader or to a common frequency. Additionally, we use our coordination scheme to provide global speed control to our three agent system.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Harrison, William. "Malleability, obliviousness and aspects for broadcast service attachment." Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4138/.

Full text
Abstract:
An important characteristic of Service-Oriented Architectures is that clients do not depend on the service implementation's internal assignment of methods to objects. It is perhaps the most important technical characteristic that differentiates them from more common object-oriented solutions. This characteristic makes clients and services malleable, allowing them to be rearranged at run-time as circumstances change. That improvement in malleability is impaired by requiring clients to direct service requests to particular services. Ideally, the clients are totally oblivious to the service structure, as they are to aspect structure in aspect-oriented software. Removing knowledge of a method implementation's location, whether in object or service, requires re-defining the boundary line between programming language and middleware, making clearer specification of dependence on protocols, and bringing the transaction-like concept of failure scopes into language semantics as well. This paper explores consequences and advantages of a transition from object-request brokering to service-request brokering, including the potential to improve our ability to write more parallel software.
APA, Harvard, Vancouver, ISO, and other styles
8

Kangude, Shantanu. "CSMA with Implicit Scheduling through State-keeping: A Distributed MAC Framework for QoS in Broadcast LANs." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-05132004-132109/unrestricted/kangude%5Fshantanu%5F200407%5Fphd.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2005. Directed by John Copeland.
Copeland, John, Committee Chair ; Owen, Henry, Committee Member ; Sivakumar, Raghupathy, Committee Member ; Lanterman, Aaron, Committee Member ; Dos Santos, Andre, Committee Member. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
9

Laird, Daniel T., and Jon Morgan. "Data Flow and Remote Control in the Telemetry Network System." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/606151.

Full text
Abstract:
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada
The Central Test and Evaluation Investment Program (CTEIP) Integrated Network Enhanced Telemetry (iNET) program is currently developing new standards for wired-wireless local area networking (LAN-WLAN) using the Internet Protocol (IP), for use in telemetry (TM) channels, under the umbrella of the Telemetry Network System (TmNS). Some advantages of TmNS are real-time command and control of instrumentation, quick-look acquisition, data retransmission and recovery ('gapless TM' or 'PCM backfill'), data segmentation, etc. The iNET team is developing and evaluating prototypes, based on commercial 802.x and other technologies, in conjunction with Range Commander's Council (RCC) Inter-Range Instrumentation Group (IRIG) standards and standards developed under the iNET program.
APA, Harvard, Vancouver, ISO, and other styles
10

Amoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.

Full text
Abstract:
This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Broadcast Control"

1

Donahue, Hugh Carter. The battle to control broadcast news: Who owns the First Amendment? Cambridge, Mass: MIT Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Teeter, Dwight L. Law of mass communications: Freedom and control of print and broadcast media. New York, NY: Foundation Press Thomson/West, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teeter, Dwight L. Law of mass communications: Freedom and control of print and broadcast media. New York, N.Y: Foundation Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bill, Loving, ed. Law of mass communications: Freedom and control of print and broadcast media. New York: Foundation Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Teeter, Dwight L. Law of mass communications: Freedom and control of print and broadcast media. 7th ed. Westbury, N.Y: Foundation Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

L, Nelson Harold. Law of mass communications: Freedom and control of print and broadcast media. 6th ed. Westbury, N.Y: Foundation Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teeter, Dwight L. Law of mass communications: Freedom and control of print and broadcast media. 8th ed. Westbury, N.Y: Foundation Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Teeter, Dwight L. Law of Mass Communications:: Freedom And Control of Print and Broadcast Media. New York, N.Y., USA: Foundation Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

L, Teeter Dwight, ed. Law of mass communications: Freedom and control of print and broadcast media. 5th ed. Mineola, N.Y: Foundation Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Duc, Jon R. Le. Law of Mass Communications: Freedom and Control of Print and Broadcast Media. 9th ed. New York, USA: Foundation Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Broadcast Control"

1

Allen, Joby. "Broadcast/Multicast Control." In WCDMA - Requirements and Practical Design, 277–83. Chichester, UK: John Wiley & Sons, Ltd, 2004. http://dx.doi.org/10.1002/0470861797.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Segall, Ilana, and Alfred Bruckstein. "On Stochastic Broadcast Control of Swarms." In Lecture Notes in Computer Science, 257–64. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44427-7_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hasan, Cengis, and Mahesh K. Marina. "Energy-Efficient User Association in Broadcast Transmission." In Network Games, Control, and Optimization, 135–45. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51034-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kao, Ming-Yang. "Unified Energy-Efficient Unicast and Broadcast Topology Control." In Encyclopedia of Algorithms, 996. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-30162-4_451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lim, Sungjun, and Haengrae Cho. "Timestamp Based Concurrency Control in Broadcast Disks Environment." In Lecture Notes in Computer Science, 333–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30583-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fang, Min-Yuan, Chi-Kao Chang, Nai-Chung Yang, I.-Chang Jou, and Chung-Ming Kuo. "Robust Player Tracking and Motion Trajectory Refinement for Broadcast Tennis Videos." In Electrical Engineering and Control, 941–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21765-4_117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boulic, Ronan, Ramon Mas, and Daniel Thalmann. "Inverse Kinetics for Center of Mass Position Control and Posture Optimization." In Image Processing for Broadcast and Video Production, 234–49. London: Springer London, 1995. http://dx.doi.org/10.1007/978-1-4471-3035-2_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Borgonovo, Flaminio, Matteo Cesana, and Luigi Fratta. "Broadcast Services and Topology Control in Ad-Hoc Networks." In IFIP International Federation for Information Processing, 407–18. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-23150-1_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Ukhyun, and Buhyun Hwang. "Optimistic Concurrency Control Based on Timestamp Interval for Broadcast Environment." In Advances in Databases and Information Systems, 106–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45710-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rogers, Paul, and Nael B. Abu-Ghazaleh. "Robustness Control for Network-Wide Broadcast in Multihop Wireless Networks." In Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks, 51–86. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9780470396384.ch3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Broadcast Control"

1

Hajizadeh, Saeed, and Ghosheh Abed Hodtani. "Asymmetric Broadcast Channels." In 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2012. http://dx.doi.org/10.1109/allerton.2012.6483467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Skevakis, Emmanouil, and Ioannis Lambadaris. "Optimal Control for Network Coding Broadcast." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, F., R. Yim, J. Guo, J. Zhang, and S. Roy. "Prioritized Broadcast Contention Control in VANET." In ICC 2010 - 2010 IEEE International Conference on Communications. IEEE, 2010. http://dx.doi.org/10.1109/icc.2010.5501792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shanmugasundaram, Jayavel, Arvind Nithrakashyap, Rajendran Sivasankaran, and Krithi Ramamritham. "Efficient concurrency control for broadcast environments." In the 1999 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/304182.304190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Azuma, Shun-ichi, Ryota Yoshimura, and Toshiharu Sugie. "Broadcast control of multi-agent systems." In 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011). IEEE, 2011. http://dx.doi.org/10.1109/cdc.2011.6160216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fujishima, Yasuo, and Shun-ichi Azuma. "Broadcast Control of Radar Surveillance System." In 2018 57th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE). IEEE, 2018. http://dx.doi.org/10.23919/sice.2018.8492612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

AU, MEI-WAI, EDWARD CHAN, and KAM-YIU LAM. "CONCURRENCY CONTROL FOR SYSTEM WITH DATA BROADCAST." In Proceedings of the 4th International Conference. WORLD SCIENTIFIC, 2000. http://dx.doi.org/10.1142/9789812792037_0019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

van Dooren, Dirk, James Gross, and Karl Henrik Johansson. "Distributed Contention Resolution in Broadcast Control Systems." In 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8619779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Azuma, Shun-ichi, Ichiro Baba, and Toshiharu Sugie. "Broadcast control of group of Markov chains." In 2012 IEEE 51st Annual Conference on Decision and Control (CDC). IEEE, 2012. http://dx.doi.org/10.1109/cdc.2012.6427084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khina, Anatoly, Yuval Kochman, and Uri Erez. "Decomposing the MIMO broadcast channel." In 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2010. http://dx.doi.org/10.1109/allerton.2010.5706894.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Broadcast Control"

1

Ghose, Debasish. Broadcast Based Control of Multi-Agent Systems for Consensus. Fort Belvoir, VA: Defense Technical Information Center, December 2010. http://dx.doi.org/10.21236/ada533400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chowdhury, K., P. Yegani, and L. Madour. Dynamic Host Configuration Protocol (DHCP) Options for Broadcast and Multicast Control Servers. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mudge, Christopher R., and Kurt D. Getsinger. Comparison of Generic and Proprietary Aquatic Herbicides for Control of Invasive Vegetation : Part 2. Emergent Plants. Engineer Research and Development Center (U.S.), November 2021. http://dx.doi.org/10.21079/11681/39679.

Full text
Abstract:
Aquatic herbicides are one of the most effective and widespread ways to manage nuisance vegetation in the US After the active ingredient is selected, often there are numerous proprietary and generic branded products to select from. To date, limited efforts have been made to compare the efficacy of brand name and generic herbicides head to head; therefore, at tot al of 20 mesocosm trials were conducted to evaluate various 2,4 -D, glyphosate, imazapyr, and triclopyr products against alligatorweed (Alternanthera philoxeroides (Mart.) Griseb.), southern cattail (hereafter referred to as cattail, Typha domingensis Pers.), and creeping water primrose (hereafter referred as primrose, Ludwigia peploides (Kunth) P.H. Raven). All active ingredients were applied to foliage at broadcast rates commonly used in applications to public waters. Proprietary and generic 2,4 -D, glyphosate, imazapyr, and triclopyr were efficacious and provided 39 to 99% control of alligatorweed, cattail and primrose in 19 of the 20 trials. There were no significant differences i n product performance except glyphosate vs. alligatorweed (trial 1, Rodeo vs. Roundup Custom) and glyphosate vs. cattail (trial 1, Rodeo vs. Glyphosate 5.4). These results demonstrate under small -scale conditions, the majority of the generic and proprietary herbicides provided similar control of emergent vegetation, regardless of active ingredient
APA, Harvard, Vancouver, ISO, and other styles
4

Kennedy, Alan, Andrew McQueen, Mark Ballentine, Brianna Fernando, Lauren May, Jonna Boyda, Christopher Williams, and Michael Bortner. Sustainable harmful algal bloom mitigation by 3D printed photocatalytic oxidation devices (3D-PODs). Engineer Research and Development Center (U.S.), April 2022. http://dx.doi.org/10.21079/11681/43980.

Full text
Abstract:
The impacts of Harmful Algal Blooms (HAB), often caused by cyanobacteria (Figure 1), on water resources are increasing. Innovative solutions for treatment of HABs and their associated toxins are needed to mitigate these impacts and decrease risks without introducing persistent legacy contaminants that cause collateral ecosystem impacts. This technical note (TN) identifies novel opportunities enabled by Additive Manufacturing (AM), or 3D printing, to produce high surface area advanced material composites to rapidly prototype sustainable environmental solutions for aquatic nuisance species control. This innovative research explores deployment of 3D-printable polymer composite structures containing nano-scale photocatalysts for targeted open water treatment of HABs that are customizable to the site-of-concern and also retrievable, reusable, and sustainable. The approach developed to control cyanobacteria HAB events has the potential to augment or replace broadcast, non-specific chemical controls that otherwise put non-target species and ecological resources at long-term risk. It can also augment existing UV-treatment HAB treatment control measures. The expected research outcome is a novel, effective, and sustainable HAB management tool for the US Army Corps of Engineers (USACE) and resource managers to deploy in their HAB rapid response programs. The research will provide a framework for scale-up into other manufacturing methods (e.g., injection molding) to produce the devices in bulk (quickly and efficiently). Research for this project title “Mitigation of Harmful Algal Bloom Toxins using 3D Printed Photocatalytic Materials (FY21-23)” was sponsored by the US Army Engineer Research Development Center’s (ERDC) Aquatic Nuisance Species Research Program (ANSRP).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography