Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
641
Strategies to improve access to cognitive behavioral therapies for anxiety disorders: A scoping review.
Published 2022-01-01“…<h4>Background</h4>Strategies to improve access to evidence-based psychological treatments (EBPTs) include but are not limited to implementation strategies. …”
Get full text
Article -
642
Launch of IJTLD OPEN: a new home for open access papers on respiratory disease
Published 2024-01-01Subjects: “…open access…”
Get full text
Article -
643
Low-hit frequency-hopping communication systems for power Internet of things random access
Published 2023-01-01“…The communication network is an essential component of the data acquisition and information transmission in power Internet of things (IoT).To meet the development requirements of multiple power service in the future, the wireless communication technique with flexible-access and high scalability is one of the development directions for power IoT.Due to the features of large-scale access, random access time, high security and reliability for information transmission of power IoT, a frequency-hopping (FH) technique with low-hit rate for random access was proposed.The construction algorithm of such FH pattern was based upon the combination and shift operation of conventional FH sequences.By the theoretical arithmetic and numerical simulation, the properties of the proposed FH pattern and the error-rate of the FH-based power IoT were evaluated.The analysis reveals that the new class of FH sequences and the system can meet the requirements of large-scale access and highly reliable communication for the power IoT, which has good application prospects.…”
Get full text
Article -
644
Pitfalls of PTOs in land ownership and control: Rethinking access for rural development in South Africa
Published 2024-11-01Subjects: “…access…”
Get full text
Article -
645
Broadcasting Bidirectional Access Network Intrusion Detection System Facing Tri-Networks Integration
Published 2015-06-01Subjects: “…broadcasting bidirectional access network…”
Get full text
Article -
646
CHARACTERIZATION OF POTATO ACCESSIONS ACCORDING TO THEIR BIOLOGICAL AND ECONOMICALLY USEFUL TRAITS IN THE ENVIRONMENTS OF MURMANSK PROVINCE
Published 2019-10-01“…The study was conducted at the Polar Experiment Station of VIR in 2016‒2018, when 40 potato accessions, which had originated from 9 different countries and had been supplied by VIR, were analyzed. …”
Get full text
Article -
647
Addressing limited access to water sanitation and hygiene in Gaza strip shelters during conflict
Published 2025-01-01“…Abstract This correspondence addresses a critical humanitarian concern: the inadequate access to water, sanitation, and hygiene (WASH) facilities in shelters within the Gaza Strip amidst ongoing conflict. …”
Get full text
Article -
648
Multiple access based on three-stage modulation in multi-band OFDM-UWB system
Published 2007-01-01Subjects: Get full text
Article -
649
Opportunistic spectrum access method for cognitive radio sensor network of typical deployment strategies
Published 2014-11-01“…Explored the opportunistic spectrum access method for cognitive radio sensor networks with regular topology patterns and coverage patterns.The method includes an economic spectrum-and-timeslot-allocation scheme,a sensing-results-reporting scheme and a cooperative spectrum-sensing scheme.A model was proposed for analyzing the blocking and dropping probability for secondary users,the effective reception bandwidth and transmission delay.Numerical analysis shows that Triangle yields the optimal cooperative sensing performance,and square yields the optimal reception bandwidth.In case of complete coverage,Square and triangle lead to less transmission delay,and in case of multiple coverage,square leads to the least transmission delay.The false alarm probability of single node has little impact on transmission delay,and Primary User’s activity may affect delay noticeably.On the other hand,larger ratio of transmission timeslot to sensing timeslot helps to decrease delay.…”
Get full text
Article -
650
Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method
Published 2014-01-01“…This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. …”
Get full text
Article -
651
Evolution of access to prenatal care in Pernambuco: maternal schooling as a marker of health inequities
Published 2025-01-01“…Results: a rising trend in access to seven or more prenatal consultations among women in Pernambuco was observed between 2011 and 2020 (+3.6; p<0.001). …”
Get full text
Article -
652
A Comparative Analysis of Gypsies’ Access to Employment Opportunities and Health Services in Pakistan and Turkey
Published 2022-12-01“…In this study, employment opportunities and access to health services of gypsies living in Pakistan and Turkey are explored. …”
Get full text
Article -
653
Adaptive channel status based access class barring scheme for traffic emergency communication
Published 2022-01-01Subjects: Get full text
Article -
654
Spectrum access scheme of MAC layer for real-time traffic in cognitive radio network
Published 2014-04-01Subjects: Get full text
Article -
655
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a ciphertext policy hidden access control scheme based on blockchain and supporting data sharing is proposed. …”
Get full text
Article -
656
Willingness-to-pay to access Ingenol Mebutate Gel for Actinic Keratosis Treatment in the U.S. Setting
Published 2014-10-01“…Between 48% and 63% of subjects were willing to pay extra to gain access to treatment with the ingenol mebutate gel profile instead of the comparators, and the mean incremental WTP ranged from $475 to $518. …”
Get full text
Article -
657
Ensuring patient access to gene therapies for rare diseases: Navigating reimbursement and coverage challenges
Published 2025-03-01“…The rapid transformation in rare disease treatment, driven by advances in genetic medicine and diagnostics, underscores the urgent need for access to these innovative therapies. With over 10,000 identified rare diseases globally, 80% of which are genetic, the current therapeutic landscape indicates that only 5% of these conditions have FDA-approved treatments. …”
Get full text
Article -
658
Design of Pulse Waveform for Waveform Division Multiple Access UWB Wireless Communication System
Published 2014-01-01“…A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. …”
Get full text
Article -
659
HEMPSEED AND COTTONSEED OILS IN THE ACCESSIONS FROM THE VIR COLLECTION AS SOURCES OF FUNCTIONAL FOOD INGREDIENTS
Published 2019-10-01“…As a result of the evaluations, valuable accessions (cultivars and lines) of hemp and cotton were identified. …”
Get full text
Article -
660
A Novel 3D Indoor Localization Scheme Using Virtual Access Point
Published 2014-04-01“…Wireless local area network (WLAN) access point (AP) is widely installed at various locations, and using these WLAN APs can be a viable alternative. …”
Get full text
Article