Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
521
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
522
PEA (PISUM L.) ACCESSIONS DIFFER IN THE STAGE OF FLOWER DEVELOPMENT BEST FOR POLLINATION
Published 2015-01-01“…Method (2) (delayed pollination) was 12 times as efficient as method (1) in accession 721 (Pisum sativum subsp. elatius), possessing very large flowers. …”
Get full text
Article -
523
Accessing contested landscapes: a political ecology of tree planting in the Lake District
Published 2024-06-01Subjects: Get full text
Article -
524
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01“…In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.…”
Get full text
Article -
525
Evaluation of commercial traits in the accessions of Medicago sativa L. from Asia Minor
Published 2019-02-01Subjects: Get full text
Article -
526
The limitation of the discovery rules of Court against the right of access to information in South Africa
Get full text
Article -
527
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01Subjects: “…access control…”
Get full text
Article -
528
Separation algorithm of paired carrier multiple access based on independent component analysis
Published 2006-01-01“…Based on the introduction of paired carrier multiple access(PCMA)technology,a new algorithm was proposed to separate the satellite PCMA downlink mixed signals with independent component analysis(ICA).The new algorithm utilized maximum negentropy as the separating criterion which could overcome the limitation that the power of two up-link signals could not be different too much.The computer simulations testified the validity of the algorithm.…”
Get full text
Article -
529
CLIMATIC FACTORS AFFECTING THE DEVELOPMENT OF EARLY SOYBEAN ACCESSIONS IN THE ENVIRONMENTS OF THE RUSSIAN NORTHWEST
Published 2018-06-01“…The duration of the period from shooting to flowering has reduced with the growth of temperatures, and for several accessions has become constant at temperatures above 19°C. …”
Get full text
Article -
530
Hydraulic bricolages: coexisting water supply and access regimes in N’Djamena, Chad
Published 2024-03-01Get full text
Article -
531
INTRASPECIFIC VARIABILITY OF THE Sus1 SUCROSE SYNTHASE GENE IN Pisum sativum ACCESSIONS
Published 2018-03-01“…This paper is devoted to characterization of Sus1 gene intraspecific variability in 14 Pisum sativum accessions. The length of the identified Sus1 gene varied from 3514 bp to 3532 bp. …”
Get full text
Article -
532
Enhanced Beidou user equipment access authentication protocol based on location key
Published 2022-11-01Subjects: Get full text
Article -
533
Alternative Dispute Resolution for Consumer Cases: Are Divergences an Obstacle to Effective Access to Justice?
Published 2014-12-01“…Insofar, consumer ADR (CADR) is seen as a useful instrument that helps consumers realize their right of access to justice. It is argued that the CADR is a flexible and faster method of enforcement of consumers’ rights, and that CADR systems provide valuable information on the needs of applicants, while preserving confidentiality and increasing consumer satisfaction. …”
Get full text
Article -
534
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01“…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
Get full text
Article -
535
Facilitating access of disabled persons to avail reproductive health by overcoming social barriers
Published 2025-01-01Get full text
Article -
536
A LOW-COST METHOD FOR THE DETECTION OF DUPLICATE HOLDINGS AMONG GENEBANK ACCESSIONS
Published 2018-06-01“…A set of 185 pairs of accessions with the same name from the Russian and Nordic collections of barley were grown in the field in Pushkin and were scored by the same person using a set of morphological descriptors. …”
Get full text
Article -
537
Contribution of Open Access Databases to Intensive Care Medicine Research: Scoping Review
Published 2025-01-01“…Collaborative ventures have enabled the emergence of large open access databases, leading to numerous publications in the field. …”
Get full text
Article -
538
Highly reliable access algorithm for PD-NOMA based IoT with delay guarantee
Published 2020-09-01Subjects: “…non-orthogonal multiple access…”
Get full text
Article -
539
Open access on a zero budget: a case study of Postcolonial Text
Published 2007-01-01Subjects: “…Case study of the open access journal Postcolonial Text…”
Get full text
Article -
540
Breeding value of european oat accessions in the environments of Kuban experiment station of VIR
Published 2019-06-01“…Evaluation of the accessions in the field was targeted at such crop characters as the duration of the growing season, resistance to lodging, and field resistance to rust diseases. …”
Get full text
Article