-
441
Multi-User Detection Algorithm for Asynchronous Non-Orthogonal Multiple Access Based on Gaussian Approximation
Published 2023-03-01Subjects: “…non-orthogonal multiple access…”
Get full text
Article -
442
Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic
Published 2024-11-01Subjects: Get full text
Article -
443
Preamble retransmission assisted control-based mMTC dynamic random access
Published 2024-03-01Subjects: Get full text
Article -
444
Naval fleet across-domain communication scheme based on CP-ABE
Published 2015-11-01Subjects: Get full text
Article -
445
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: Get full text
Article -
446
Access to justice in times of AI: towards a low-cost justice?
Published 2024-12-01Subjects: Get full text
Article -
447
Node clustered deployment of emergency Internet of things based on UAV with equipment access restriction
Published 2021-09-01Subjects: Get full text
Article -
448
The rural health initiative: Bridging gaps in healthcare access and grant-funded research in central Idaho
Published 2025-01-01Subjects: Get full text
Article -
449
A Dual Threshold Based Opportunistic Spectrum Access Policy with Non-Ideal Spectrum Sensing
Published 2014-08-01Subjects: “…opportunistic spectrum access…”
Get full text
Article -
450
Impact of overload factor on uplink SCMA system
Published 2018-06-01Subjects: Get full text
Article -
451
A cost-effective and miniaturized SPN deployment strategy for group customer dedicated lines
Published 2023-07-01Subjects: Get full text
Article -
452
Privacy-preserving attribute-based encryption scheme on ideal lattices
Published 2018-03-01Subjects: Get full text
Article -
453
Machine learning validation of the AVAS classification compared to ultrasound mapping in a multicentre study
Published 2025-01-01Subjects: “…Arteriovenous access…”
Get full text
Article -
454
Backoff algorithm in MAC layer for wireless multimedia sensor networks
Published 2010-01-01Subjects: Get full text
Article -
455
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01Subjects: Get full text
Article -
456
CAM-MAC: channel aware multi-channel MAC protocol in cognitive radio network
Published 2014-04-01Subjects: Get full text
Article -
457
Temporary Access to Documents Containing Medical Secrecy (Criminal Procedural Aspect)
Published 2020-02-01Subjects: Get full text
Article -
458
Highly reliable access algorithm for PD-NOMA based IoT with delay guarantee
Published 2020-09-01Subjects: “…non-orthogonal multiple access…”
Get full text
Article -
459
Analysis of software defined security model and architecture
Published 2017-06-01Subjects: “…access control…”
Get full text
Article -
460