Showing 121 - 140 results of 10,539 for search '"accessibility"', query time: 0.07s Refine Results
  1. 121

    Embedding Trust in the Media Access Control Protocol for Wireless Networks by Chaminda Alocious, Hannan Xiao, Bruce Christianson, Joseph Spring

    Published 2025-01-01
    “…IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. …”
    Get full text
    Article
  2. 122

    Studying the biochemical composition of peanut accessions from the VIR collection by V. D. Bemova, T. V. Shelenga, M. Sh. Asfandiyarova, T. V. Yakusheva, N. V. Kishlyan

    Published 2024-10-01
    “…The accessions were reproduced for three years (2019–2021) at two ecogeographic locations: in Krasnodar Territory, and Astrakhan Province. …”
    Get full text
    Article
  3. 123

    Enhanced overloaded code division multiple access for network on chip by Behnam Vakili, Morteza Gholipour

    Published 2022-03-01
    “…Abstract The Code‐division multiple access (CDMA) method is commonly used as the network infrastructure in multi‐core chips. …”
    Get full text
    Article
  4. 124
  5. 125

    Access of primary school students to information and communication technologies in Turkey by Ira Gözde Özenç, İra Nejat, Güngörc Şevket, Çakır Pınar, Aksu Ali

    Published 2024-06-01
    “…Given 5,328,391 students in primary schools only, around 3.6 million students did not have regular access to the EBA system. All the tiers considered, a total of 11 million students could not access the EBA system. …”
    Get full text
    Article
  6. 126

    LOCAL BARLEY ACCESSIONS FROM ETHIOPIA RESISTANT TO POWDERY MILDEW by N. V. Alpatieva, R. A. Abdullaev, I. N. Anisimova, N. K. Gubareva, O. N. Kovaleva, E. E. Radchenko

    Published 2018-06-01
    “…Three accessions (k-8555, k-8682 k-17554) were heterogeneous by the studied trait. …”
    Get full text
    Article
  7. 127

    Design of Interference-Resilient Medium Access for High Throughput WLANs by Luca Reggiani, Andrea Gola, Gian Mario Maggio, Gianluigi Tiberi

    Published 2015-10-01
    “…In this paper, we analyze a protocol strategy for managing multiple access in wireless networks. A network of sensors colocated with the WLAN terminals forms a control layer for managing the medium access and scheduling resources in order to limit collisions and optimize the WLAN data traffic; this control layer is based on a low-power wideband technology characterized by interference robustness, like CDMA (code division multiple access) or UWB (ultra-wideband) for sensors. …”
    Get full text
    Article
  8. 128
  9. 129

    Legal Guerilla: Jurisdiction, Time, and Abortion Access in Mexico City by Amy Krauss

    Published 2021-12-01
    “…In closing, she argues that feminist activists who work to create access and people who seek abortion enact their own forms of “legal guerilla” as they move through these overlapping and contradictory legalities.…”
    Get full text
    Article
  10. 130
  11. 131
  12. 132
  13. 133

    An Application of Improved Gap-BIDE Algorithm for Discovering Access Patterns by Xiuming Yu, Meijing Li, Taewook Kim, Seon-phil Jeong, Keun Ho Ryu

    Published 2012-01-01
    “…Discovering access patterns from web log data is a typical sequential pattern mining application, and a lot of access pattern mining algorithms have been proposed. …”
    Get full text
    Article
  14. 134

    ACCESSING FINANCE FOR INNOVATIVE EU SMES – KEY DRIVERS AND CHALLENGES by Laura Vasilescu

    Published 2014-11-01
    “…However, SMEs can fulfill this potential if they obtain the finance necessary to start and develop their businesses. Access to finance is a key determinant for business start-up, development and growth for SMEs, including the innovative ones, and they have different needs and face different challenges. …”
    Get full text
    Article
  15. 135
  16. 136
  17. 137

    Customizing GPT for natural language dialogue interface in database access by Jin-Dong Kim, Kousaku Okubo

    Published 2024-11-01
    “…It illustrates the significant potential of large language models (LLMs) as user-friendly interfaces for database access. Furthermore, it showcases the seamless integration of LLMs and database APIs, within the GPTS framework, offering a promising and straightforward approach.…”
    Get full text
    Article
  18. 138

    GREENBUG RESISTANCE IN OAT ACCESSIONS FROM DAGESTAN AND CAUCASIAN COUNTRIES by E. E. Radchenko, M. A. Chumakov, I. G. Loskutov

    Published 2019-10-01
    “…They are followed by accessions from Georgia (25%), Armenia (17.3%) and Dagestan (13.8%). …”
    Get full text
    Article
  19. 139

    Improving Access in Gastroenterology: The Single Point of Entry Model for Referrals by Kerri L Novak, Sander Veldhuyzen Van Zanten, Sachin R Pendharkar

    Published 2013-01-01
    “…There are many benefits of SEMs including improved access and reduced wait times. Understanding and measuring complex patient flow systems is key to improving access, and centralized intake systems provide an opportunity to better understand total demand and system bottlenecks. …”
    Get full text
    Article
  20. 140