Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
282,722 result(s) for "Data communications"
Sort by:
Screens producing & media operations : advanced practice for media server and video content preparation
\"Media servers have established themselves as the dominant video playback tool for live events; however, the practice of delivering content to these systems and the structure of the media operations team is still evolving. This book outlines a workflow for video content delivery and describes team communication that can be applied to any entertainment production including: television specials, concert touring, corporate events, theater, as well as special events, film, large audience marketing events, and multi-screen permanent installations. This workflow is hardware and software independent, designed to evolve with future technologies as they become established in the field of multi-screen production, and has been proven professionally by the author and her peers over a decade of productions. The methodology presented will provide insights beneficial to students and current practitioners of media server technology, screens producers, and video content developers. Using real world examples of internationally recognized productions, a foundation is laid for best practices in Media Operations. Full-color versions of the images inside the book are available online\"-- Provided by publisher.
Pragmatics of Computer-Mediated Communication
The present handbook provides an overview of the pragmatics of language and language use mediated by digital technologies. Computer-mediated communication (CMC) is defined to include text-based interactive communication via the Internet, websites and other multimodal formats, and mobile communication. In addition to 'core' pragmatic and discourse-pragmatic phenomena the chapters cover pragmatically-focused research on types of CMC and pragmatic approaches to characteristic CMC phenomena.
Factors influencing research data communication on Zika virus: a grounded theory
Purpose The purpose of this paper is to propose a theoretical model to illustrate factors influencing research data communication on diseases caused by the Zika virus. Design/methodology/approach The grounded theory methodology was adopted. For data collection, interviews were conducted with 13 Brazilian researchers involved with the Zika virus theme. Data analysis was performed using the open, axial and selective coding processes, according to the principles of the grounded theory. Findings Based on data collection and analysis, seven theoretical categories representing intervening factors in Zika virus research data communication were identified. The emerging theory showed the centrality of researchers’ expectations for acknowledgment and reward, influenced by the aspects of research funding and academic culture. Three factors involved in the macro processes of research data communication: data use, data production and data sharing. In the use and production processes, factors related to collaboration figured most strongly. In the production and sharing processes, the factors regarding data processing and the use of research data repositories were more pronounced. Finally, data sharing, and the possibility of reusing data are directly affected by the social context of Zika virus disease as an emerging disease. Originality/value The study presents a theory developed systematically to explain the phenomenon of communication of research data on Zika virus. The theory presents a set of intervening factors of the process of communication of research data and discusses the factors in light of the fundamentals of information science.
Driving 5G mobile communications with artificial intelligence towards 6G
\"Driving 5G Mobile Communications with Artificial Intelligence towards 6G\" presents current work and directions of continuous innovation and development in multimedia communications with a focus on services and users. The fifth generation of mobile wireless networks achieved the first deployment by 2020, completed the first phase of evolution in 2022, and started transition phase of 5G-Advanced toward the sixth generation. Perhaps one of the most important innovations brought by 5G is the platform-approach to connectivity, i.e., a single standard that can adapt to the heterogeneous connectivity requirements of vastly different use cases. 5G networks contain a list of different requirements, standardized technical specifications and a range of implementation options with spectral efficiency, latency, and reliability as primary performance metrics. Towards 6G, machine learning (ML) and artificial intelligence (AI) methods have recently proposed new approaches to modeling, designing, optimizing and implementing systems. They are now matured technologies that improve many research fields significantly.--Back cover.
An adaptive anti-jamming system in HyperLedger-based wireless sensor networks
Using new methodologies such as Blockchain in data communications in wireless sensor networks (WSN) has emerged owing to the proliferation of collaborative technologies. However, the WSN is still vulnerable to denial of service cyber attacks, in which jamming attack becomes prevalent in blocking data communications in WSN. The jamming attack launches malicious sensor nodes to block legitimate data communications by intentional interference. This can in turn cause monitoring disruptions, data loss and other safety-critical issues. In order to address the malicious attacks, this paper proposes an adaptive anti-jamming solution based on Hyperledger Fabric-based Blockchain, named as ABAS, to ensure the reliability and adaptivity of data communication in case of jamming attacks. In order to validate the ABAS solution, we applied the algorithm in healthcare WSN and showed that ABAS has significantly reduce the jamming coverage and energy consumption while maintaining high computational performance.
The digital humanities : a primer for students and scholars
\"The Digital Humanities is a comprehensive introduction and practical guide to how humanists use the digital to conduct research, organize materials, analyze, and publish findings. It summarizes the turn toward the digital that is reinventing every aspect of the humanities among scholars, libraries, publishers, administrators, and the public. Beginning with some definitions and a brief historical survey of the humanities, the book examines how humanists work, what they study, and how humanists and their research have been impacted by the digital and how, in turn, they shape it. It surveys digital humanities tools and their functions, the digital humanists' environments, and the outcomes and reception of their work. The book pays particular attention to both theoretical underpinnings and practical considerations for embarking on digital humanities projects. It places the digital humanities firmly within the historical traditions of the humanities and in the contexts of current academic and scholarly life\"-- Provided by publisher.
A Reliable Transmission on Cluster Based Wireless Ad Hoc Network with Adaptive Negotiations Using Vector Assisted Energy Efficient Dynamic Opportunistic Routing Mechanism
Reliable data transmission within wireless AdHoc networks is a formidable challenge, owing to the distinct attributes of mobile data communication. Existing routing protocols struggle to accommodate the dynamic nature of data traffic, leading to energy losses and substantial propagation delays. In response to these challenges, we introduce a novel Vector Assisted Energy Efficient Dynamic Opportunistic Routing model, implemented through an Adaptive negotiation-based cluster routing protocol. The approach involves strategically partitioning the network into clusters, each facilitated by an optimal cluster head. These clusters optimize data transmission and network longevity by gathering mobile nodes through negotiations. Our model leverages a reactive opportunistic routing protocol and organizes packet forwarding into vectors. Through extensive simulations using NS2, we evaluate the proposed scheme against conventional routing protocols. Key metrics, including Throughput, Packet delivery ratio, Average end-to-end delay, Network lifetime, and packet drop, demonstrate the efficacy of our model. Notably, our approach outperforms conventional methods, particularly in energy savings during data collection and transmission within high-traffic contexts. And our study contributes a novel solution to the challenges of wireless AdHoc networks. The Vector Assisted Energy Efficient Dynamic Opportunistic Routing model showcases superior reliability, efficiency, and network longevity. This work not only advances data communication in such networks but also provides a template for future research in enhancing wireless communication systems.
Secure data communication in WSN using Prairie Indica optimization
PurposeSecurity is the major issue that motivates multiple scholars to discover security solutions apart from the advantages of wireless sensor networks (WSN) such as strong compatibility, flexible communication and low cost. However, there exist a few challenges, such as the complexity of choosing the expected cluster, communication overhead, routing selection and the energy level that affects the entire communication. The ultimate aim of the research is to secure data communication in WSN using prairie indica optimization.Design/methodology/approachInitially, the network simulator sets up clusters of sensor nodes. The simulator then selects the Cluster Head and optimizes routing using an advanced Prairie Indica Optimization algorithm to find the most efficient communication paths. Sensor nodes collect data, which is securely transmitted to the base station. By applying prairie indica optimization to WSNs, optimize key aspects of data communication, including secure routing and encryption, to protect sensitive information from potential threats.FindingsThe Prairie Indica Optimization, as proposed, achieves impressive results for networks comprising 50 nodes, with delay, energy and throughput values of 77.39 ms, 21.68 J and 22.59 bps. In the case of 100-node networks, the achieved values are 80.95 ms, 27.74 J and 22.03 bps, significantly surpassing the performance of current techniques. These outcomes underscore the substantial improvements brought about by the Prairie Indica Optimization in enhancing WSN data communication.Originality/valueIn this research, the Prairie Indica Optimization is designed to enhance the security of data communication within WSN.