Showing 481 - 500 results of 15,110 for search '"accessibility"', query time: 0.07s Refine Results
  1. 481

    Resource Allocation Schemes Between Multi-Hop Backhaul Network and Access Network by Hongtao Yang, Yehui Liu, Yu'e Song, Shewen Sun, Lin Liu

    Published 2015-02-01
    “…The resource allocation issue between multi-hop backhaul network and access network was investigated. The relay backhaul network and access network share the same resource. …”
    Get full text
    Article
  2. 482
  3. 483

    A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing by Canling Wang, Wei Wu, Fulong Chen, Hong Shu, Ji Zhang, Yuxuan Zhang, Taochun Wang, Dong Xie, Chuanxin Zhao

    Published 2024-01-01
    “…Patients share personal health data by granting access rights to users or medical institutions. The major purpose of the existing access control techniques is to identify users who are permitted to access medical data. …”
    Get full text
    Article
  4. 484

    Use and legislation of Glyphosate in Mexico: healthcare, healthy environment and drinking water access. by Arizbeth Pérez-Martínez, Arely Vergara-Castañeda, Kytzia Esmeralda Mercado-Moreno, Christian Benítez-Núñez, Alma Cossette Guadarrama Muñoz

    Published 2025-01-01
    “…To achieve this purpose, its use has been debated in constitutional obligations to human rights to health, the environment, and access to drinking water. Glyphosate is an agrochemical compound used as a main substance in the formulation of pesticides having a low toxicological level, and it is currently the most widely used herbicide worldwide. …”
    Get full text
    Article
  5. 485

    Location fingerprint optimization based access point deployment in indoor WLAN localization by Mu ZHOU, Qiao-lin PU, Zeng-shan TIAN

    Published 2015-11-01
    “…A novel access point (AP) deployment approach by optimizing the location fingerprints in indoor WLAN localization was proposed.Firstly,constructing the water-filling optimization model based on the maximum of the Euclidean distance of RSS between every two location fingerprints.Secoudly,after the process of the iterative cross-zero adjustment and discrete adjustment,the nonnegative and discrete weights of candidate AP locations were obtained.Finally,by using the criterion of maximum average weight,the APs,and consequently optimize the location fingerprints were deployed rationally.The experimental results demonstrate that the proposed approach is able to achieve high location fingerprint based localization precision,as well as consume low time overhead involved in the optimal AP location searching.…”
    Get full text
    Article
  6. 486
  7. 487

    Distributed Congestion Mitigation and Medium Access in Duty Cycling Wireless Sensor Networks by Hao Liu, Ye Liu

    Published 2014-08-01
    “…However, it may aggravate congestion due to long access delay and amplified hidden/exposed terminal problems. …”
    Get full text
    Article
  8. 488

    Fulminant necrotising fasciitis complicating upper limb arteriovenous fistula access for haemodialysis by Sri Satyavathi Davulury, Vinod Bhan

    Published 2024-12-01
    “…We report the rare occurrence of upper limb dialysis access with pseudoaneurysms of the cephalic vein with necrotising fasciitis resulting in fulminant gangrene.…”
    Get full text
    Article
  9. 489

    Forecasting Asparaginase Need and Cost for Childhood Cancer Using ACCESS FORxECAST by Terence M. Hughes, Nitin Shrivastava, Lewis B. Silverman, A. Lindsay Frazier, Sumit Gupta, Avram Denburg

    Published 2025-01-01
    “…Until recently, ASN was available in three formulations: native Escherichia coli, PEGylated E. coli (PEG), and Erwinase, with native E. coli typically more accessible in low- and middle-income countries (LMICs). …”
    Get full text
    Article
  10. 490
  11. 491
  12. 492
  13. 493
  14. 494

    Multi-authority attribute-based access control system in mHealth with traceability by Qi LI, Hongbo ZHU, Jinbo XIONG, Ruo MO

    Published 2018-06-01
    “…Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to enhance fine-grained access control over encrypted data.However,existing attribute-based mHealth systems either lack of efficient traceable approach,or support only single authority.A traceable multi-authority attribute-based access control mHealth scheme was proposed,which was constructed over composite order groups and supports any monotonic access structures described by linear secret sharing scheme (LSSS).The adaptive security was proved under subgroup decisional assumptions.The traceability was proved under k-strong Diffie-Hellman (k-SDH) assumption.The performance analysis indicates that the proposed scheme is efficient and available.…”
    Get full text
    Article
  15. 495
  16. 496

    The Effect of Telemedicine on Access to Acute Stroke Care in Texas: The Story of Age Inequalities by Karen C. Albright, Amelia K. Boehme, Michael T. Mullen, Tzu-Ching Wu, Charles C. Branas, James C. Grotta, Sean I. Savitz, Catherine Wolff, Bisakha Sen, Brendan G. Carr

    Published 2015-01-01
    “…The objective of this study is to determine if disparities exist in access to PSCs or the extended access to acute stroke care provided by TM. …”
    Get full text
    Article
  17. 497

    Aerobiology matters: Why people in the community access pollen information and how they use it by Danielle E. Medek, Constance H. Katelaris, Andelija Milic, Paul J. Beggs, Edwin R. Lampugnani, Don Vicendese, Bircan Erbas, Janet M. Davies

    Published 2025-01-01
    “…This research investigated why individuals in the community access pollen information, how they use it, and the perceived benefits. …”
    Get full text
    Article
  18. 498

    A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks by Faisal Kaleem, Abolfazl Mehbodniya, Kang K. Yen, Fumiyuki Adachi

    Published 2013-01-01
    “…These wireless access technologies usually differ in terms of their operating parameters. …”
    Get full text
    Article
  19. 499

    Secure opportunistic access control in D2D-enabled cellular network by Yajun CHEN, Xinsheng JI, Kaizhi HUANG, Jing YANG, Ming YI

    Published 2018-01-01
    “…The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.…”
    Get full text
    Article
  20. 500

    Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information by Raik Kuhlisch

    Published 2017-07-01
    “…Attribute-based Access Control (ABAC) is proposed as a proper means for such regulation. …”
    Get full text
    Article