Showing 521 - 540 results of 15,110 for search '"accessibility"', query time: 0.06s Refine Results
  1. 521
  2. 522

    PEA (PISUM L.) ACCESSIONS DIFFER IN THE STAGE OF FLOWER DEVELOPMENT BEST FOR POLLINATION by O. E. Kosterin, V. S. Bogdanova

    Published 2015-01-01
    “…Method (2) (delayed pollination) was 12 times as efficient as method (1) in accession 721 (Pisum sativum subsp. elatius), possessing very large flowers. …”
    Get full text
    Article
  3. 523
  4. 524

    Trusted access scheme for intranet mobile terminal based on encrypted SD card by Jiyang LI, Pengyuan ZHAO, Zhe LIU

    Published 2019-08-01
    “…In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.…”
    Get full text
    Article
  5. 525
  6. 526
  7. 527
  8. 528

    Separation algorithm of paired carrier multiple access based on independent component analysis by WAN Jian, XU Hua, ZHU Zhong-liang

    Published 2006-01-01
    “…Based on the introduction of paired carrier multiple access(PCMA)technology,a new algorithm was proposed to separate the satellite PCMA downlink mixed signals with independent component analysis(ICA).The new algorithm utilized maximum negentropy as the separating criterion which could overcome the limitation that the power of two up-link signals could not be different too much.The computer simulations testified the validity of the algorithm.…”
    Get full text
    Article
  9. 529

    CLIMATIC FACTORS AFFECTING THE DEVELOPMENT OF EARLY SOYBEAN ACCESSIONS IN THE ENVIRONMENTS OF THE RUSSIAN NORTHWEST by I. V. Seferova, L. Y. Novikova

    Published 2018-06-01
    “…The duration of the period from shooting to flowering has reduced with the growth of temperatures, and for several accessions has become constant at temperatures above 19°C. …”
    Get full text
    Article
  10. 530
  11. 531

    INTRASPECIFIC VARIABILITY OF THE Sus1 SUCROSE SYNTHASE GENE IN Pisum sativum ACCESSIONS by E. A. Dyachenko, M. A. Slugina

    Published 2018-03-01
    “…This paper is devoted to characterization of Sus1 gene intraspecific variability in 14 Pisum sativum accessions. The length of the identified Sus1 gene varied from 3514 bp to 3532 bp. …”
    Get full text
    Article
  12. 532
  13. 533

    Alternative Dispute Resolution for Consumer Cases: Are Divergences an Obstacle to Effective Access to Justice? by Urša Jeretina, Alan Uzelac

    Published 2014-12-01
    “…Insofar, consumer ADR (CADR) is seen as a useful instrument that helps consumers realize their right of access to justice. It is argued that the CADR is a flexible and faster method of enforcement of consumers’ rights, and that CADR systems provide valuable information on the needs of applicants, while preserving confidentiality and increasing consumer satisfaction. …”
    Get full text
    Article
  14. 534

    Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA

    Published 2012-04-01
    “…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
    Get full text
    Article
  15. 535
  16. 536

    A LOW-COST METHOD FOR THE DETECTION OF DUPLICATE HOLDINGS AMONG GENEBANK ACCESSIONS by F. . Yndgaard, I. G. Loskutov, S. O. Solberg, O. N. Kovaleva, A. . Kolodinska-Brantestam, J. T. Svensson

    Published 2018-06-01
    “…A set of 185 pairs of accessions with the same name from the Russian and Nordic collections of barley were grown in the field in Pushkin and were scored by the same person using a set of morphological descriptors. …”
    Get full text
    Article
  17. 537

    Contribution of Open Access Databases to Intensive Care Medicine Research: Scoping Review by Julien Kallout, Antoine Lamer, Julien Grosjean, Gaétan Kerdelhué, Guillaume Bouzillé, Thomas Clavier, Benjamin Popoff

    Published 2025-01-01
    “…Collaborative ventures have enabled the emergence of large open access databases, leading to numerous publications in the field. …”
    Get full text
    Article
  18. 538

    Highly reliable access algorithm for PD-NOMA based IoT with delay guarantee by Chaonong XU, Jianxiong WU, Yongjun XU

    Published 2020-09-01
    Subjects: “…non-orthogonal multiple access…”
    Get full text
    Article
  19. 539

    Open access on a zero budget: a case study of Postcolonial Text by John Willinsky, Ranjini Mendis

    Published 2007-01-01
    Subjects: “…Case study of the open access journal Postcolonial Text…”
    Get full text
    Article
  20. 540

    Breeding value of european oat accessions in the environments of Kuban experiment station of VIR by N. P. Voytsutskaya, I. G. Loskutov

    Published 2019-06-01
    “…Evaluation of the accessions in the field was targeted at such crop characters as the duration of the growing season, resistance to lodging, and field resistance to rust diseases. …”
    Get full text
    Article