-
321
-
322
A Multiuser Subcarrier and Power Allocation Scheme to Improve the Performance of Cell Edge Users
Published 2015-05-01Subjects: Get full text
Article -
323
-
324
Behavior authentication of Web users based on machine learning
Published 2018-01-01Subjects: Get full text
Article -
325
Technical scheme of the unified account authentication service for operators
Published 2018-05-01Subjects: Get full text
Article -
326
3-Dimensional Dense Coverage: Opportunities and Challenges for Future Mobile Communications
Published 2013-06-01Subjects: Get full text
Article -
327
Analysis of uplink user capacity for a TDD-CDMA system with a single traffic
Published 2007-01-01Subjects: Get full text
Article -
328
Monitoring tools as energy saving enablers in social housing context
Published 2022-12-01Subjects: Get full text
Article -
329
Dataset on travellers’ acceptance of border control technologies: Insights from METICOS pilot trialsPilot) supported by Zenodo
Published 2025-02-01Subjects: Get full text
Article -
330
Ad Hoc Data Foraging in a Life Sciences Community Ecosystem Using SoDa
Published 2025-01-01Subjects: Get full text
Article -
331
Relationship between Personality Types Conceptualized by C. G. Jung and Latvian IT Specialist Preferences
Published 2015-10-01Subjects: Get full text
Article -
332
Human–computer interaction in healthcare: Comprehensive review
Published 2024-10-01Subjects: Get full text
Article -
333
Belediyelerin Sunduğu Hizmetlerde Vatandaş Memnuniyeti: Silifke Belediyesi Örneği
Published 2011-02-01Subjects: Get full text
Article -
334
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01Subjects: Get full text
Article -
335
De l’interopérabilité à la réutilisabilité des éditions électroniques
Published 2020-01-01Subjects: Get full text
Article -
336
Supporting teams with designing for dissemination and sustainability: the design, development, and usability of a digital interactive platform
Published 2024-12-01Subjects: Get full text
Article -
337
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01Subjects: Get full text
Article -
338
Improving the healthcare user experience: an optimization model grounded in patient-centredness
Published 2025-01-01Subjects: Get full text
Article -
339
Design of walking aids for the elderly based on the Kano-AHP-FEC method
Published 2025-01-01Subjects: Get full text
Article -
340
Optimal deployment of energy-efficient ultra-dense network
Published 2017-03-01Subjects: Get full text
Article