Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
241
Evaluating access to psychosocial services for the medicaid-insured children in Georgia
Published 2025-01-01Subjects: “…Healthcare access…”
Get full text
Article -
242
Solution of CSFB UE accessing no-CSFB 4G network
Published 2016-02-01Subjects: Get full text
Article -
243
An Unusual Mishap during Root Canal Access in Retreatment Case
Published 2012-01-01Get full text
Article -
244
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: Get full text
Article -
245
Enhanced cloud storage access control scheme based on attribute
Published 2013-08-01Subjects: Get full text
Article -
246
<italic>IEEE Access</italic>™ Editorial Board
Published 2025-01-01“…IEEE Access…”
Get full text
Article -
247
A survey of resource allocation in non-orthogonalmultiple access systems
Published 2018-08-01Subjects: “…non-orthogonalmultiple access…”
Get full text
Article -
248
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01“…IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. …”
Get full text
Article -
249
Research on extended access control mechanism in online social network
Published 2021-10-01“…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
Get full text
Article -
250
Studying the biochemical composition of peanut accessions from the VIR collection
Published 2024-10-01“…The accessions were reproduced for three years (2019–2021) at two ecogeographic locations: in Krasnodar Territory, and Astrakhan Province. …”
Get full text
Article -
251
Ontological security dynamics in the EU accession process of North Macedonia
Published 2024-01-01“…Yet, as the case of North Macedonia illustrates, the process of EU accession goes along with bilateral disputes and can trigger concerns about ontological (in)security. …”
Get full text
Article -
252
Security Mechanism for Dual Stack Network Accessing of Home Gateway
Published 2014-12-01Subjects: Get full text
Article -
253
Enhanced overloaded code division multiple access for network on chip
Published 2022-03-01“…Abstract The Code‐division multiple access (CDMA) method is commonly used as the network infrastructure in multi‐core chips. …”
Get full text
Article -
254
Food access interventions in American Indian and Alaska Native communities
Published 2025-01-01Subjects: “…food access…”
Get full text
Article -
255
Joint optimization of power and channel access in cognitive radio network
Published 2017-02-01“…In cognitive radio networks,according to the problem of all users can access the same channel to communicate,two joint optimization schemes for different scenarios were proposed.When the system is infeasible,a scheme of joint optimal power and admission control was proposed.As admission control is the NP problem,the LP-SO was used to achieve optimize control.At the same time,the convergence of the proposed algorithm was analyzed and proved.When the system is feasible,a scheme of joint optimal power and transmission rate allocation was proposed,using the improved Lagrange duality algorithm to achieve optimize control.The numerical results show that compared with other admission control algorithms,the time complexity of proposed algorithm is increased,but it can converge quickly,effectively improves the number of admitted uses while reducing power consumption.In addition,the proposed algorithm can allocate transmission rate more fairly.…”
Get full text
Article -
256
Access and Handover Authentication in Intermittent Connection Scenario of Satellite Network
Published 2021-09-01Subjects: Get full text
Article -
257
Interference-aware node access scheme in UAV-aided VANET
Published 2019-06-01“…In vehicular Ad Hoc network (VANET),frequent link handovers and channel interference can lead to increased transmission delay and decreased network throughput.To address the issues,unmanned aerial vehicle (UAV) were introduced to cooperate with vehicles and construct UAV-assisted air-ground integrated VANET.An interference-aware node access scheme was proposed.The node access problem was formulated as a multi-objective optimization problem considering link transmission rate,link handovers and transmit power.Then the optimization problem was decomposed into two convex optimization sub-problems by dual decomposition method,the sub-problem jointly optimizes handovers and link transmission rate while the sub-problem optimizes the transmit power based on link reliability.Finally,simulation results show that the proposed mechanism can effectively improve data delivery ratio,average end-to-end delay and network throughput.…”
Get full text
Article -
258
Multi-user collaborative access control scheme in cloud storage
Published 2016-01-01Subjects: Get full text
Article -
259
Access of primary school students to information and communication technologies in Turkey
Published 2024-06-01“…Given 5,328,391 students in primary schools only, around 3.6 million students did not have regular access to the EBA system. All the tiers considered, a total of 11 million students could not access the EBA system. …”
Get full text
Article -
260
Joint time and beam domain non-orthogonal multiple access
Published 2021-04-01“…In order to improve the system’s ability to accommodate connected devices, a joint time and beam domain non-orthogonal multiple access (NOMA) scheme was proposed, which was suitable for millimeter wave massive multiple-input multiple-output (MIMO) systems.The correlation and difference of the users’ channel were utilized to realize beam-domain NOMA, and sparse spreading technology was utilized to realize time-domain NOMA.With the optimization goal of improving the communication reliability of the system, optimization problem of the joint domain sparse access matrix design was constructed and solved.Finally, the access matrix was reconstructed based on the channel quality of the joint domain, and the interference cancellation operation was added to the message passing algorithm (MPA), which reduced the decoding complexity and improves the communication reliability.…”
Get full text
Article