Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
601
Assessment of access and outcomes of kidney transplantation through the reforms of the Swiss organ allocation system
Published 2025-01-01“…In 2015, the score was optimized to balance the impact of preemptive listing and HLA matching of hyperimmunized recipients.MethodsWe reviewed access to transplants and post-transplant outcomes along those changes, defining three periods (v0: 2007–2012, v1: 2012–2015, v2: 2015–2020).ResultsChanges in the Swiss allocation system improved the fairness of access to transplantation, particularly for hyperimmunized patients. …”
Get full text
Article -
602
“Crisscross” Approach: An Unconventional Technique for Simultaneous Antegrade and Retrograde Catheterization through Femoral Access
Published 2024-12-01Subjects: “…antegrade superficial femoral artery access…”
Get full text
Article -
603
Results of testing soybean accessions at the Far East Experiment Station of VIR in 1990-2017
Published 2020-01-01“…Background. Soybeans accessions from the VIR collection were tested in Primorsky Territory, Russia. …”
Get full text
Article -
604
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01Subjects: Get full text
Article -
605
Effective Throughput of Cognitive Multiple Access Channel Under Collision Constraints and Imperfect Sensing
Published 2015-12-01Subjects: Get full text
Article -
606
Eksplorasi ABAC dan XACML untuk Design Access Control pada Resource Digital
Published 2019-10-01“…Akses kontrol lebih fleksibel dibanding dengan pendekatan otorisasi, autentikasi ataupun verifikasi yang sangat sederhana. Mekanisme access control policy dengan pendekatan atribut diyakini sebagai solusi adaptif yaitu ABAC (Attribute Based Access Control) dengan implementasi model XACML (Extensible Access Control Modelling Language). …”
Get full text
Article -
607
A New Prime Code for Synchronous Optical Code Division Multiple-Access Networks
Published 2018-01-01“…A new spreading code based on a prime code for synchronous optical code-division multiple-access networks that can be used in monitoring applications has been proposed. …”
Get full text
Article -
608
ANAXAM @ TOMCAT 2.0: easy access to cutting-edge tomographic microscopy for industry
Published 2025-02-01Get full text
Article -
609
Optimization of multiple access in the energy harvesting wireless sensor network with delivery deadline constraint
Published 2022-09-01Subjects: Get full text
Article -
610
Breaking down barriers: promoting journals beyond the page with open access journal clubs
Published 2025-02-01“…Their educational purpose is two-fold: (a) to provide junior psychiatrists with a friendly but large-scale platform to evaluate and critically appraise recent articles published in the BJPsych and (b) to present new research findings in an open and accessible manner. In this paper, we discuss our framework, the challenges we encountered, how the original model is evolving based on feedback from trainees, and tips for success when delivering international online journal clubs.…”
Get full text
Article -
611
Modified Access to Academic Disciplines through Online Journals: Downloading a New Metaphor
Published 2004-01-01Get full text
Article -
612
Midterm Experience of Ipsilateral Axillary-Axillary Arteriovenous Loop Graft as Tertiary Access for Haemodialysis
Published 2014-01-01“…To present a series of ipsilateral axillary artery to axillary vein loop arm grafts as an alternative vascular access procedure for haemodialysis in patients with difficult access. …”
Get full text
Article -
613
Library legislation and free access to information as new topics in library and information science education.
Published 2000-01-01Subjects: Get full text
Article -
614
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
Published 2021-03-01Subjects: “…access control…”
Get full text
Article -
615
TH-PAM multiple access scheme for 60 GHz pulse wireless communication system
Published 2016-04-01“…Under the IEEE 802.15.3.c channel model,relationship analysis model between system BER performance,communication distance and number of user was put forward,multi-user interference characteristics of the system with TH-PAM multiple access modulation was studied. It was compared with TH-PPM multiple access system. …”
Get full text
Article -
616
Accountability of Local Authorities in Accessing Land Information of Ethnic Minorities in Binh Dinh Province
Published 2025-01-01Subjects: Get full text
Article -
617
Collection accessions and source material as a determining factor for producing new melon cultivars
Published 2020-06-01Subjects: “…accessions…”
Get full text
Article -
618
5G mobile/multi-access edge computing integrated architecture and deployment strategy
Published 2018-04-01Subjects: Get full text
Article -
619
Space-time spectrum sharing based on game theory:dynamic access and penalty strategy
Published 2023-12-01“…To tackle the challenge of inefficient utilization of spatiotemporal spectrum resources in heterogeneous networks, a reliable spectrum sharing strategy based on game theory was proposed for scenarios where multiple secondary users dynamically access through sensing spatiotemporal spectrum opportunities.Firstly, secondary users sensed the activity state of primary users through channel sampling and subsequently seek suitable spatiotemporal spectrum opportunities.Each secondary user aimed to access more spectrum resources while preventing quality degradation between primary users.Consequently, a negotiation of individual utilities between secondary and primary users was needed, in order to reach a mixed Nash equilibrium.When the secondary user's transmission power was abnormal, its behavior would be regarded as a violation.Then, a backoff time compensation algorithm was presented to penalize the secondary users, according to the number of violations and active nodes in the network.Finally, simulation results validate the effectiveness of the spatiotemporal spectrum opportunities sharing strategy with the penalty mechanism.…”
Get full text
Article -
620
Evaluation of oat accessions from different ecological groups in the steppe environments of Krasnodar Territory
Published 2024-10-01“…Three hundred and seven oat accessions of various ecogeographic origin were tested under the conditions of the Kuban Experiment Station, a branch of the N.I. …”
Get full text
Article