-
341
Novel opportunistic cooperative multicast scheme for NOMA
Published 2020-11-01Subjects: “…non-orthogonal multiple access…”
Get full text
Article -
342
Performance of FTH-PPM multiple access technology in 60 GHz wireless communication system
Published 2017-10-01Subjects: Get full text
Article -
343
-
344
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01Subjects: Get full text
Article -
345
Resource sharing and incentive mechanism for multi-access edge computing networks
Published 2023-11-01Subjects: “…multi-access edge computing…”
Get full text
Article -
346
Strategic Climate Litigation before National Courts: Can European Union Law be used as a Shield?
Published 2024-08-01Subjects: Get full text
Article -
347
Research on optimal channel access method for distributed wireless network based on reliable multicast communication
Published 2022-12-01Subjects: “…distributed wireless channel access…”
Get full text
Article -
348
-
349
Producing secure multimodal biometric descriptors using artificial neural networks
Published 2021-03-01Subjects: “…biometrics (access control)…”
Get full text
Article -
350
Cognitive network spectrum access for emergency communications
Published 2012-11-01Subjects: “…opportunistic spectrum access…”
Get full text
Article -
351
Systemic Barriers and Unfairness: Access to Justice in Zimbabwe and Beyond
Published 2024-12-01Subjects: “…Access to justice…”
Get full text
Article -
352
Research on decision making of optimal communication system based on user
Published 2016-10-01Subjects: “…multiple access…”
Get full text
Article -
353
Modelling the effects of climate policy on firewood collection and women’s welfare in developing countries
Published 2025-01-01Subjects: Get full text
Article -
354
Solution of CSFB UE accessing no-CSFB 4G network
Published 2016-02-01Subjects: Get full text
Article -
355
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
356
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
357
Students with disabilities in higher education call for personal empowerment, equitable inclusive systems, and individualized accommodations
Published 2025-02-01Subjects: Get full text
Article -
358
Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment
Published 2025-01-01Subjects: Get full text
Article -
359
-
360
Risk access control model for Hadoop
Published 2016-01-01Subjects: “…risk access control…”
Get full text
Article