Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
481
Resource Allocation Schemes Between Multi-Hop Backhaul Network and Access Network
Published 2015-02-01“…The resource allocation issue between multi-hop backhaul network and access network was investigated. The relay backhaul network and access network share the same resource. …”
Get full text
Article -
482
Medium access control of multimedia CDMA systems with effective spectral bandwidth distribution
Published 2006-01-01Subjects: Get full text
Article -
483
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…Patients share personal health data by granting access rights to users or medical institutions. The major purpose of the existing access control techniques is to identify users who are permitted to access medical data. …”
Get full text
Article -
484
Use and legislation of Glyphosate in Mexico: healthcare, healthy environment and drinking water access.
Published 2025-01-01“…To achieve this purpose, its use has been debated in constitutional obligations to human rights to health, the environment, and access to drinking water. Glyphosate is an agrochemical compound used as a main substance in the formulation of pesticides having a low toxicological level, and it is currently the most widely used herbicide worldwide. …”
Get full text
Article -
485
Location fingerprint optimization based access point deployment in indoor WLAN localization
Published 2015-11-01“…A novel access point (AP) deployment approach by optimizing the location fingerprints in indoor WLAN localization was proposed.Firstly,constructing the water-filling optimization model based on the maximum of the Euclidean distance of RSS between every two location fingerprints.Secoudly,after the process of the iterative cross-zero adjustment and discrete adjustment,the nonnegative and discrete weights of candidate AP locations were obtained.Finally,by using the criterion of maximum average weight,the APs,and consequently optimize the location fingerprints were deployed rationally.The experimental results demonstrate that the proposed approach is able to achieve high location fingerprint based localization precision,as well as consume low time overhead involved in the optimal AP location searching.…”
Get full text
Article -
486
Variability of the period between germination and heading in spring barley accessions from Dagestan
Published 2020-04-01“…Petersburg contributed to the earliness of barley accessions.…”
Get full text
Article -
487
Distributed Congestion Mitigation and Medium Access in Duty Cycling Wireless Sensor Networks
Published 2014-08-01“…However, it may aggravate congestion due to long access delay and amplified hidden/exposed terminal problems. …”
Get full text
Article -
488
Fulminant necrotising fasciitis complicating upper limb arteriovenous fistula access for haemodialysis
Published 2024-12-01“…We report the rare occurrence of upper limb dialysis access with pseudoaneurysms of the cephalic vein with necrotising fasciitis resulting in fulminant gangrene.…”
Get full text
Article -
489
Forecasting Asparaginase Need and Cost for Childhood Cancer Using ACCESS FORxECAST
Published 2025-01-01“…Until recently, ASN was available in three formulations: native Escherichia coli, PEGylated E. coli (PEG), and Erwinase, with native E. coli typically more accessible in low- and middle-income countries (LMICs). …”
Get full text
Article -
490
A comprehensive analysis of time investment in skid trail planning for forest access.
Published 2025-01-01Get full text
Article -
491
A BARRIER-FREE ENVIRONMENT FOR THE DEVELOPMENT OF ACCESSIBLE TOURISM: DOMESTIC AND FOREIGN EXPERIENCE
Published 2018-01-01Subjects: Get full text
Article -
492
Performance study of hybrid spectrum access scheme in millimeter wave cellular network
Published 2018-08-01Subjects: Get full text
Article -
493
-
494
Multi-authority attribute-based access control system in mHealth with traceability
Published 2018-06-01“…Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to enhance fine-grained access control over encrypted data.However,existing attribute-based mHealth systems either lack of efficient traceable approach,or support only single authority.A traceable multi-authority attribute-based access control mHealth scheme was proposed,which was constructed over composite order groups and supports any monotonic access structures described by linear secret sharing scheme (LSSS).The adaptive security was proved under subgroup decisional assumptions.The traceability was proved under k-strong Diffie-Hellman (k-SDH) assumption.The performance analysis indicates that the proposed scheme is efficient and available.…”
Get full text
Article -
495
Differentiated services dynamic spectrum access strategy for cognitive wireless mesh network
Published 2014-03-01Subjects: Get full text
Article -
496
The Effect of Telemedicine on Access to Acute Stroke Care in Texas: The Story of Age Inequalities
Published 2015-01-01“…The objective of this study is to determine if disparities exist in access to PSCs or the extended access to acute stroke care provided by TM. …”
Get full text
Article -
497
Aerobiology matters: Why people in the community access pollen information and how they use it
Published 2025-01-01“…This research investigated why individuals in the community access pollen information, how they use it, and the perceived benefits. …”
Get full text
Article -
498
A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks
Published 2013-01-01“…These wireless access technologies usually differ in terms of their operating parameters. …”
Get full text
Article -
499
Secure opportunistic access control in D2D-enabled cellular network
Published 2018-01-01“…The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.…”
Get full text
Article -
500
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01“…Attribute-based Access Control (ABAC) is proposed as a proper means for such regulation. …”
Get full text
Article