Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
661
An Integrated Metaheuristic Routing Method for Multiple-Block Warehouses with Ultranarrow Aisles and Access Restriction
Published 2019-01-01“…Those limitations prohibit pickers from walking through the whole aisle, and the access restriction even allows them to access the pick aisles only from specific entrances. …”
Get full text
Article -
662
Node clustered deployment of emergency Internet of things based on UAV with equipment access restriction
Published 2021-09-01Subjects: Get full text
Article -
663
Service aware base station processing resource allocation for centralized radio access network
Published 2018-08-01Subjects: “…centralized radio access network…”
Get full text
Article -
664
THE IMPACT OF HUMAN RESOURCE OUTSOURCING ON EMPLOYEE PERFORMANCE (A CASE STUDY OF ACCESS BANKPLC)
Published 2022-12-01“…Thus, this research examinedthe impact of human resource outsourcing on employee performance in one of the Nigerian Deposit Money Banks, Access Bank Plc. The conceptual framework of this connection between being an outsourced employee in Access bank and performance is synthesized mostly from primary sources of which the data was gathered using questionnaires, observation and oral interviews,and structured based onthe research hypothesis. …”
Get full text
Article -
665
Non-orthogonal multiple-access system SC-FDMA-IDMA with iterative block equalization
Published 2014-08-01“…As a new non-orthogonal multiple-access scheme, SC-FDMA-IDMA combines two technologies of SC-FDMA and IDMA together. …”
Get full text
Article -
666
Evaluation of spring bread wheat accessions from the VIR collection for resistance to loose smut
Published 2019-01-01“…Screening of spring wheat accessions for resistance to loose smut has been carried out since 2016 in the Genetics Department of the N. …”
Get full text
Article -
667
Response to the comment on "Central Venous Access via Middle Approach Using the Seldinger Guidewire"
Published 2013-10-01Get full text
Article -
668
Handover decision with multi-access edge computing in 6G networks: A survey
Published 2025-03-01Subjects: Get full text
Article -
669
Is There Gender Disparity in Vascular Access for Hemodialysis with New Percutaneous Systems? A Systematic Review
Published 2024-09-01“…Background: Historically, a large gender-related disparity in vascular access (VA) has been demonstrated, with there being a lower prevalence of women with arteriovenous fistula (AVF) compared to men, and women have worse maturity rates. …”
Get full text
Article -
670
The geographical digital divide in broadband access and governmental policies in Japan: three case studies
Published 2010-08-01“…Although broadband access has spread to a certain degree in developed countries/regions, geographical gaps in broadband access (the so-called “geographical digital divide”) remain. …”
Get full text
Article -
671
Healthcare workers’ perspectives on trauma and mental health access for Rohingya refugees in Cox’s Bazar
Published 2025-01-01“…The Rohingya continued to experience trauma during their forced migration to Bangladesh and were exposed to additional stressors in the post-migration settings in refugee camps, including lack of access to adequate mental health services. These experiences have resulted in a spectrum of stress-and trauma-related symptoms. …”
Get full text
Article -
672
Optimal Scheduling Strategy for Regional Microgrid considering Large-Scale Access of Electric Vehicles
Published 2022-01-01“…To address these limitations, we propose an optimal scheduling strategy considering large-scale access of EVs based on the typical regional MG composed of commercial and residential subareas, combining the power consumption characteristics of the two subareas and the travel characteristics of EVs. …”
Get full text
Article -
673
Declining Trend of Transapical Access for Transcatheter Aortic Valve Replacement in Patients with Aortic Stenosis
Published 2022-01-01“…Included among the shifts has been the advent of alternative access sites for TAVR. Consequently, transapical access (TA) has become significantly less common. …”
Get full text
Article -
674
Research on multi-access selection mechanism for multi-mode terminals in heterogeneous wireless networks
Published 2012-07-01Subjects: “…network access selection…”
Get full text
Article -
675
FINANCIAL LITERACY, ACCESS TO FINANCE AND THE PROVISION OF SCHOOL RESOURCES AMONG PRIVATE SCHOOLS IN NIGERIA
Published 2024-12-01Subjects: “…access to finance…”
Get full text
Article -
676
From Book to Playlist: How Open-Access Audio Archives are Renewing the Poetry Collection
Published 2022-12-01“…Open-access audio archives are changing the ways we consume and conceive of poetry. …”
Get full text
Article -
677
Social Determinants and Access to Induced Abortion in Burkina Faso: From Two Case Studies
Published 2014-01-01Get full text
Article -
678
Accessing medical records for research in South African public hospitals: a reflective narrative
Published 2025-01-01“…Abstract Background Access to medical data is important for health system research in South Africa. …”
Get full text
Article -
679
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01“…The architecture of safety production monitoring platform was discussed based on the discussion of the TPM trusted platform, the hardware architecture based on trusted mobile platform of ARM + DSP dual core proces-sor was proposed, the user access to the process of biometric authentication and user terminal hardware authentica-tion properties of registration protocol were proposed, and its performance was analyzed. …”
Get full text
Article -
680
Accessing the Power of Tests Based on Set-Indexed Partial Sums of Multivariate Regression Residuals
Published 2018-01-01Get full text
Article