To see the other types of publications on this topic, follow the link: Enhanced electronic access.

Journal articles on the topic 'Enhanced electronic access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Enhanced electronic access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Onashoga, Adebukola, Adebayo Abayomi Alli, and Timileyin Ogunseye. "Enhanced Role Based Access Control Mechanism for Electronic Examination System." International Journal of Computer Network and Information Security 6, no. 3 (February 8, 2014): 1–9. http://dx.doi.org/10.5815/ijcnis.2014.03.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moothart, Tom. "Muddy waters bring the library blues and enhanced electronic access to journals." Serials Review 23, no. 4 (December 1997): 79–82. http://dx.doi.org/10.1080/00987913.1997.10764412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shrestha, Anish Prasad, Sang-Jo Yoo, Hyoung Jin Choi, and Kyung Sup Kwak. "Enhanced Rate Division Multiple Access for Electromagnetic Nanonetworks." IEEE Sensors Journal 16, no. 19 (October 2016): 7287–96. http://dx.doi.org/10.1109/jsen.2016.2598579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Fangzhou, Li Chen, Nan Zhao, Yunfei Chen, F. Richard Yu, and Guo Wei. "NOMA-Enhanced Computation Over Multi-Access Channels." IEEE Transactions on Wireless Communications 19, no. 4 (April 2020): 2252–67. http://dx.doi.org/10.1109/twc.2019.2963654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inan, Inanc, Feyza Keceli, and Ender Ayanoglu. "Analysis of the 802.11e enhanced distributed channel access function." IEEE Transactions on Communications 57, no. 6 (June 2009): 1753–64. http://dx.doi.org/10.1109/tcomm.2009.06.0701132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li Liew, Chern, Schubert Foo, and K. R. Chennupati. "A proposed information environment for enhanced integrated access and valueadding to electronic documents." Aslib Proceedings 52, no. 2 (March 2000): 58–75. http://dx.doi.org/10.1108/eum0000000007001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

ALEMSEGED, Yohannes D., Chen SUN, Ha NGUYEN TRAN, and Hiroshi HARADA. "Enhanced Media Access Scheme for Distributed Spectrum Sensing." IEICE Transactions on Communications E93-B, no. 12 (2010): 3266–73. http://dx.doi.org/10.1587/transcom.e93.b.3266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Peng, F., B. Peng, and D. Qian. "Performance analysis of IEEE 802.11e enhanced distributed channel access." IET Communications 4, no. 6 (2010): 728. http://dx.doi.org/10.1049/iet-com.2009.0035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.

Full text
Abstract:
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enforced on clouds storage.
APA, Harvard, Vancouver, ISO, and other styles
10

Arunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.

Full text
Abstract:
Now-a-days, most hospitals and medical centers is to manage huge volume of patient’s medical records into database. It is essential to collect and access this information everywhere, to increase productivity and improve quality of health cares. Need to access electronic health information across the world and improve the quality of healthcare to patients will highlight importance of using cloud computing architecture in this area. But, despite the benefits of cloud computing applications for health care, the security challenges of cloud should be addressed. In this paper, we introduce and describe a new proposed model called Electronic Health Record with Multi-Clouds Databases. This model will ensure the privacy of persons in a network and multi-cloud environment using cryptographic algorithm and distributed storage. This model is able to store any type of data such as number, string, image, etc. in a cloud environment. The Electronic Health Record with Multi-Clouds Database prevent from illegal intrusion and access to data in cloud environment and provide services such as data integrity, confidentiality and permanent availability of data in a safe and secure way. The evaluation results of proposed method show that despite increasing time of information storage and retrieval and System overhead
APA, Harvard, Vancouver, ISO, and other styles
11

Al-Hubaishi, M., T. Alahdal, R. Alsaqour, A. Berqia, M. Abdelhaq, and O. Alsaqour. "Enhanced binary exponential backoff algorithm for fair channel access in theieee802.11 medium access control protocol." International Journal of Communication Systems 27, no. 12 (August 6, 2013): 4166–84. http://dx.doi.org/10.1002/dac.2604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kanwal, Tehsin, Ather Abdul Jabbar, Adeel Anjum, Saif UR Malik, Abid Khan, Naveed Ahmad, Umar Manzoor, Muhammad Naeem Shahzad, and Muhammad A. Balubaid. "Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud." International Journal of Distributed Sensor Networks 15, no. 6 (June 2019): 155014771984605. http://dx.doi.org/10.1177/1550147719846050.

Full text
Abstract:
State-of-the-art progress in cloud computing encouraged the healthcare organizations to outsource the management of electronic health records to cloud service providers using hybrid cloud. A hybrid cloud is an infrastructure consisting of a private cloud (managed by the organization) and a public cloud (managed by the cloud service provider). The use of hybrid cloud enables electronic health records to be exchanged between medical institutions and supports multipurpose usage of electronic health records. Along with the benefits, cloud-based electronic health records also raise the problems of security and privacy specifically in terms of electronic health records access. A comprehensive and exploratory analysis of privacy-preserving solutions revealed that most current systems do not support fine-grained access control or consider additional factors such as privacy preservation and relationship semantics. In this article, we investigated the need of a privacy-aware fine-grained access control model for the hybrid cloud. We propose a privacy-aware relationship semantics–based XACML access control model that performs hybrid relationship and attribute-based access control using extensible access control markup language. The proposed approach supports fine-grained relation-based access control with state-of-the-art privacy mechanism named Anatomy for enhanced multipurpose electronic health records usage. The proposed (privacy-aware relationship semantics–based XACML access control model) model provides and maintains an efficient privacy versus utility trade-off. We formally verify the proposed model (privacy-aware relationship semantics–based XACML access control model) and implemented to check its effectiveness in terms of privacy-aware electronic health records access and multipurpose utilization. Experimental results show that in the proposed (privacy-aware relationship semantics–based XACML access control model) model, access policies based on relationships and electronic health records anonymization can perform well in terms of access policy response time and space storage.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhu, Rongbo, and Yuhang Yang. "Model-based admission control for IEEE 802.11e enhanced distributed channel access." AEU - International Journal of Electronics and Communications 61, no. 6 (June 2007): 388–97. http://dx.doi.org/10.1016/j.aeue.2006.07.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shi, Zhenjiang, Wei Gao, Shangwei Zhang, Jiajia Liu, and Nei Kato. "AI-Enhanced Cooperative Spectrum Sensing for Non-Orthogonal Multiple Access." IEEE Wireless Communications 27, no. 2 (April 2020): 173–79. http://dx.doi.org/10.1109/mnet.001.1900305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

ElAzzouni, Sherif, and Eylem Ekici. "Node-Based Distributed Channel Access With Enhanced Delay Characteristics." IEEE/ACM Transactions on Networking 26, no. 3 (June 2018): 1474–87. http://dx.doi.org/10.1109/tnet.2018.2834302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Salahuddin, Shairfe Muhammad, Volkan Kursun, and Hailong Jiao. "FinFET SRAM Cells with Asymmetrical Bitline Access Transistors for Enhanced Read Stability." Transactions on Electrical and Electronic Materials 16, no. 6 (December 25, 2015): 293–302. http://dx.doi.org/10.4313/teem.2015.16.6.293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ma, Jie, Jing He, Ming Chen, Yi Liu, Zhihua Zhou, and Kaiquan Wu. "Enhanced performance of PS-256QAM-OFDM for optical access network." Optics Communications 467 (July 2020): 125566. http://dx.doi.org/10.1016/j.optcom.2020.125566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

R. Rejin Paul, N., and D. Paul Raj. "Enhanced Trust Based Access Control for Multi-Cloud Environment." Computers, Materials & Continua 69, no. 3 (2021): 3079–93. http://dx.doi.org/10.32604/cmc.2021.018993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Junyu, Min Sheng, Tony Q. S. Quek, and Jiandong Li. "D2D Enhanced Co-Ordinated Multipoint in Cloud Radio Access Networks." IEEE Transactions on Wireless Communications 15, no. 6 (June 2016): 4248–62. http://dx.doi.org/10.1109/twc.2016.2537806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

ALANSI, M., I. ELSHAFIEY, A. AL-SANIE, S. ALGHUWAINEM, and H. AL-SHARARI. "MC-OFDMA FOR MULTI-USER DETECTION SCHEMES IN POWERLINE COMMUNICATION." Journal of Circuits, Systems and Computers 22, no. 08 (September 2013): 1350063. http://dx.doi.org/10.1142/s0218126613500631.

Full text
Abstract:
Support of multiple users in wideband powerline communication (PLC) is essential to enhance the dependence on such emerging systems. This paper presents novel adaptations of the space division multiple access (SDMA) techniques to PLC. Multicarrier data transmission and orthogonal frequency division multiple access (OFDMA) techniques are invoked to mitigate the technical challenges of PLC channel impairments and enhance the spectral efficiency. Performance is enhanced using orthogonal Walsh–Hadamard codes. Linear and nonlinear multi-user detection (MUD) schemes are investigated, including the optimal maximum likelihood (ML) methods and the near-optimal sphere detectors(SDs). Presented results indicate the potential of the proposed scheme to enhance wideband PLC systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Ye, Cong, Tengfei Deng, Junchi Zhang, Liangping Shen, Pin He, Wei Wei, and Hao Wang. "Enhanced resistive switching performance for bilayer HfO2/TiO2resistive random access memory." Semiconductor Science and Technology 31, no. 10 (September 1, 2016): 105005. http://dx.doi.org/10.1088/0268-1242/31/10/105005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Oh, H., B. Cho, W. Y. Cho, S. Kang, B. Choi, H. Kim, K. Kim, et al. "Enhanced Write Performance of a 64-Mb Phase-Change Random Access Memory." IEEE Journal of Solid-State Circuits 41, no. 1 (January 2006): 122–26. http://dx.doi.org/10.1109/jssc.2005.859016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhifeng Tao and S. Panwar. "Throughput and delay analysis for the IEEE 802.11e enhanced distributed channel access." IEEE Transactions on Communications 54, no. 4 (April 2006): 596–603. http://dx.doi.org/10.1109/tcomm.2006.873066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

MacKenzie, R., and T. O'Farrell. "Achieving service differentiation in IEEE 802.11e enhanced distributed channel access systems." IET Communications 6, no. 7 (2012): 740. http://dx.doi.org/10.1049/iet-com.2011.0537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Al-Samman, Imad, Reham Almesaeed, Angela Doufexi, and Mark Beach. "Heterogeneous Cloud Radio Access Networks: Enhanced Time Allocation for Interference Mitigation." Wireless Communications and Mobile Computing 2018 (October 10, 2018): 1–17. http://dx.doi.org/10.1155/2018/2084571.

Full text
Abstract:
Responding to the unprecedented challenges imposed by the 5G technologies, mobile operators have given significant attention to Heterogeneous Cloud Radio Access Networks (H-CRAN) due to their beneficial features of performing optimization, cost effectiveness, and improving spectral and energy efficiency performance. H-CRAN inherits the attractive benefits of Heterogeneous Networks (HetNet) and the cloud computing by facilitating interference mitigation, scalability, and radio resource control. Consequently, H-CRAN is proposed in this article as a cost-effective potential solution to alleviate intertier interference and improve cooperative processing gains in HetNets by employing cloud computing. H-CRAN can provide efficient resource sharing at the spectrum, network, and infrastructure levels. Therefore, this article proposes H-CRAN cooperative interference mitigation method that enhances the time sharing among Radio Remote Heads (RRH) users. The study proposes an enhanced Almost Blank Subframe (ABSF) technique to increase the SINR and throughput of the small-cell (low power base station) and macrocell users. Simulation results show that the proposed Dynamic Programming-Diverse Almost Blank Subframe (ABSF) Pattern (DP-DAP) scheme improved the macro- and small-cell users up to 56% and 35%, respectively, as compared to other state-of-the-art ABSF schemes.
APA, Harvard, Vancouver, ISO, and other styles
26

Kim, Hyunsook, Laeyoung Kim, and Andreas Kunz. "Enhanced 3GPP system for interworking with fixed broadband access network." IEEE Communications Magazine 51, no. 3 (March 2013): 88–95. http://dx.doi.org/10.1109/mcom.2013.6476871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Rai, Rohit K., Kavita Gupta, Deepika Tyagi, Arup Mahata, Silke Behrens, Xinchun Yang, Qiang Xu, Biswarup Pathak, and Sanjay K. Singh. "Access to highly active Ni–Pd bimetallic nanoparticle catalysts for C–C coupling reactions." Catalysis Science & Technology 6, no. 14 (2016): 5567–79. http://dx.doi.org/10.1039/c6cy00037a.

Full text
Abstract:
A facile access to highly active (with enhanced TONs/TOFs) and durable bimetallic Ni–Pd nanoparticle catalysts for C–C coupling reactions was achieved by tuning Ni to Pd atomic ratio in the Ni–Pd nanoparticle catalyst and therefore the electronic charge transfer from Ni to Pd.
APA, Harvard, Vancouver, ISO, and other styles
28

Ahmad-Anas, Siti B., Mohamad K. Abdullah, Makhfudzah Mokhtar, and Stuart D. Walker. "Multiple access interference elimination with enhanced chromatic dispersion tolerance in SAC OCDMA." IEICE Electronics Express 5, no. 16 (2008): 617–23. http://dx.doi.org/10.1587/elex.5.617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jiang, Hai, Ping Wang, and Weihua Zhuang. "A Distributed Channel Access Scheme with Guaranteed Priority and Enhanced Fairness." IEEE Transactions on Wireless Communications 6, no. 6 (June 2007): 2114–25. http://dx.doi.org/10.1109/twc.2007.05746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Stamati, Teta, and Drakoulis Martakos. "Electronic Transformation of Local Government." International Journal of Electronic Government Research 7, no. 1 (January 2011): 20–37. http://dx.doi.org/10.4018/jegr.2011010102.

Full text
Abstract:
The paper examines the critical success factors for employees’ adoption of the unified Local Government Access Framework (LGAF), deployed for the Central Union of Municipalities and Communities of Greece. Following an extensive bibliographical survey, an initial conceptual framework (CF1) based on the Technology Acceptance Model (TAM) for LGAF adoption is proposed, which is empirically explored within sixteen Local Governments Organizations. The CF1 is revised using the structured-case approach. New concepts discovered during each research cycle revealed that LGAF adoption is a procedure of experiential judgement. The applicability of the TAM is investigated and the model is enhanced, exploring additional variables that affect perceived ease of use, perceived usefulness and actual use. A final complementary CF2 is presented and the evaluation of this model according to the data received from the case studies is discussed.
APA, Harvard, Vancouver, ISO, and other styles
31

Xu, Min. "Electronic Structure and Optical Properties of Cu-Doped SnO2." Applied Mechanics and Materials 716-717 (December 2014): 20–23. http://dx.doi.org/10.4028/www.scientific.net/amm.716-717.20.

Full text
Abstract:
based on Density Functional Theory, we investigated the optical structures and the electronic properties of Cu doped SnO2with density of 12.5%, including band structure, the density of state (dos), Dielectric function and optical absorption spectrum. The results show that Fermi level access conduction band gradually with the doped density. It has enhanced the electrical and metal property of material. The peaks of reflectivity spectrum and absorption spectrum correspond density of state.
APA, Harvard, Vancouver, ISO, and other styles
32

Kory, Carol, Kevin Lambert, Roberto Acosta, and James Nessel. "Prototype antenna elements for the next-generation TDRS enhanced multiple-access array." IEEE Antennas and Propagation Magazine 50, no. 4 (August 2008): 72–83. http://dx.doi.org/10.1109/map.2008.4653664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Lee, C. K., J. H. Kwak, and D. K. Jeong. "Enhanced token bucket policer using reduced fair queuing for Ethernet access networks." IET Communications 1, no. 6 (2007): 1248. http://dx.doi.org/10.1049/iet-com:20060517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Adewale Olumide Sunday, Boyinbode Olutayo, and Salako E. Adekunle. "An Enhanced Computational Fusion Technique for Security of Authentication of Electronic Voting System." International Journal of Smart Security Technologies 7, no. 2 (July 2020): 22–37. http://dx.doi.org/10.4018/ijsst.2020070102.

Full text
Abstract:
The detection of a false individual who had not been enrolled as a genuine participant in an election could be potentially detected in electronic voting systems as against paper-based methods. In recent time, one-time password and biometrics have been used to curtail false acceptance of imposters. However, imposters had unlawfully stolen the credentials of genuine individuals, gained unauthorized access, and polled illegitimate votes due to poor authentication methodology. The accuracy of a multi-biometric system is a function of the data type used and fusion method adopted. This paper presented a computational fusion approach that involved the use of fingerprint and randomly generated voter identification number to effectively satisfy the authentication security requirement of the electronic voting system. New architectural and mathematical equations on the proposed approach were presented to tackle the problem of false acceptance rate and improve on the true acceptance rate of a biometric system. Algorithm to achieve the proposed approach was presented in this paper as well.
APA, Harvard, Vancouver, ISO, and other styles
35

Jeon, Wha Sook, and Dong Geun Jeong. "Enhanced Channel Access for Connection State of Bluetooth Low Energy Networks." IEEE Transactions on Vehicular Technology 66, no. 9 (September 2017): 8469–81. http://dx.doi.org/10.1109/tvt.2017.2675915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sankaranarayanan, Suresh, and Vigneshwaran Udayasuriyan. "Biometric Secured Electronic Health Record." International Journal of E-Health and Medical Communications 7, no. 4 (October 2016): 1–27. http://dx.doi.org/10.4018/ijehmc.2016100101.

Full text
Abstract:
Lot of Hospitals around the world are going through transformation from paper based to Electronic Health record system which can be accessed from anywhere. But with such Electronic health record, security is very much needed towards avoiding hackers and unauthorized personnel to access the medical record pretending as doctor or patient. Lot of research been conducted in regards to an authentication of the biometric system and security on the digital electronic health records of the health care organization. In such biometric system, there has been an increase in the false rejection ratio due to a slight difference in the positioning of the finger on the biometric scanner. The small wounds and scratches on the fingers may also lead to the false rejection of the legitimate user. So accordingly the authors in this research have developed innovative and enhanced technology of the frame based biometric authentication system by segmenting the fingerprint image towards authenticating the medical personnel. This method reduces the False Rejection Ratio (FRR) and False Acceptance Ratio (FAR) compared to neighbouring nodal and data centric method. In addition, with the frame based biometric authentication, the authors have also developed level of strictness for doctor's and patient's based on placement of finger in biometric scanner. Lastly, the authors have also developed an application which integrates Frame based biometric methodology along with RFID and GSM for access of records in a secured way and also to provide a better treatment and medicines for incoming patients.
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Fagui, Yangyu Tang, and Liangming Wang. "eHAPAC: A Privacy-Supported Access Control Model for IP-Enabled Wireless Sensor Networks." Sensors 19, no. 7 (March 28, 2019): 1513. http://dx.doi.org/10.3390/s19071513.

Full text
Abstract:
The implementation of IP technology in wireless sensor networks has promoted the development of many smart scenarios. To enhance secure access in IP-enabled wireless sensor networks, access control to sensor nodes is a necessary process. However, access control currently faces two challenges, feasibility and preservation of user access privacy. In this paper, we propose eHAPAC, a novel privacy-preserving access control model for IP-enabled wireless sensor networks. The contributions of our paper include three parts. First, this paper integrates the Hidra access control protocol and APAC privacy-preserving model, addressing the issue of privacy-preserving access control in resource-constrained devices. Second, this paper proposes an enhanced Hidra protocol to implement the unlinkability of protocol message exchanges. Third, to solve the problem of third party credibility, this paper improves the group signature-based APAC model and utilizes blockchain technology to manage the storage and publication of public group signature keys. Security analysis and performance evaluation prove that our protocol is secure and effective.
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Wen-jia, Xiao-lin Hou, and Lan Chen. "Enhanced uplink non-orthogonal multiple access for 5G and beyond systems." Frontiers of Information Technology & Electronic Engineering 19, no. 3 (March 2018): 340–56. http://dx.doi.org/10.1631/fitee.1700842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

HAN, I., H. S. PARK, and M. S. HAN. "Enhanced Class-of-Service Oriented Packet Scheduling Scheme for EPON Access Networks." IEICE Transactions on Communications E91-B, no. 10 (October 1, 2008): 3334–37. http://dx.doi.org/10.1093/ietcom/e91-b.10.3334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chun-Ting Chou and K. G. Shin. "An enhanced inter-access point protocol for uniform intra and intersubnet handoffs." IEEE Transactions on Mobile Computing 4, no. 4 (July 2005): 321–34. http://dx.doi.org/10.1109/tmc.2005.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Blanchat, Kelly Marie. "Optimizing KBART guidelines to restore perpetual access." Collection Building 34, no. 1 (January 5, 2015): 13–16. http://dx.doi.org/10.1108/cb-04-2014-0022.

Full text
Abstract:
Purpose – This case study aims to demonstrate how proactive use of KBART guidelines can assist librarians in the analysis and restoration of journal titles with post-cancellation perpetual access. Design/methodology/approach – After experiencing a 25-per cent decrease in the collection budget, the Queens College Libraries (QCL) faced losing electronic journal content with cancellations to Big Deal licensing agreements. By using tools such as Serials Solutions, Ex Libris SFX and Microsoft Excel, the library was able to optimize KBART guidelines to analyze and restore journal titles under perpetual access licensing clauses. The implemented workflow mirrored the process to create “Big Deal” renewal spreadsheets at Springer Science + Business Media. Findings – By using KBART guidelines to manipulate and analyze data, the library was efficiently able to identify journal titles for perpetual access. Because the resulting data were formatted within KBART guidelines, it could then be transferred to a knowledge base for enhanced content discovery. Practical implications – While there are numerous variations on perpetual access rights across hundreds of vendors, the workflow developed at QCL can be replicated, or altered on a case-by-case basis. By highlighting the work necessary to implement perpetual access clauses, this article makes a case for both standardizing licensing clauses as well as increased vendor adoption of KBART guidelines. Originality/value – This case study examines the workflow of an Electronic Resources librarian with vendor experience, the overlap of concerns between librarians and vendors, and the ways in which to analyze journal holdings without an automated system.
APA, Harvard, Vancouver, ISO, and other styles
42

Shin, Woo, and Jeong Kim. "A capture-aware access control method for enhanced RFID anti-collision performance." IEEE Communications Letters 13, no. 5 (May 2009): 354–56. http://dx.doi.org/10.1109/lcomm.2009.081970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li Liew, Chern, and Schubert Foo. "Derivation of interaction environment and information object properties for enhanced integrated access and value‐adding to electronic documents." Aslib Proceedings 51, no. 8 (October 1999): 256–68. http://dx.doi.org/10.1108/eum0000000006985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Spencer, Julie A. "Electronic Documentation and the Caring Nurse-Patient Relationship." International Journal of Human Caring 14, no. 2 (March 2010): 29–34. http://dx.doi.org/10.20467/1091-5710.14.2.29.

Full text
Abstract:
Caring behaviors demonstrated by the nurse facilitate the nurse-patient relationship and may ultimately promote healing. In already crowded curricula, nursing educators strive to incorporate the concept of caring. Moreover, today’s complex, information-driven healthcare climate calls upon educators to prepare students to use information and document care appropriately, often in an electronic format. Although seemingly disparate, high-tech documentation and technology can augment and support aspects of caring in the nurse-patient relationship. This occurs through enhanced caring communication, information access, and time-saving elements demonstrated and practiced by simulation techniques. This article provides a review of technology and simulation in nursing education and discusses the use of simulation as a means to incorporate electronic documentation into the caring nurse-patient relationship.
APA, Harvard, Vancouver, ISO, and other styles
45

Stabile, Cara, Larissa K. Temple, Jessica S. Ancker, Ethan Basch, Jeanne Carter, Magen Miranda, Daniel Stein, et al. "Ambulatory cancer care electronic symptom self-reporting (ACCESS) for surgical patients: a randomised controlled trial protocol." BMJ Open 9, no. 9 (September 2019): e030863. http://dx.doi.org/10.1136/bmjopen-2019-030863.

Full text
Abstract:
IntroductionAn increasing proportion of cancer surgeries are ambulatory procedures requiring a stay of 1 day or less in the hospital. Providing patients and their caregivers with ongoing, real-time support after discharge aids delivery of high-quality postoperative care in this new healthcare environment. Despite abundant evidence that patient self-reporting of symptoms improves quality of care, the most effective way to monitor and manage this self-reported information is not known.Methods and analysisThis is a two-armed randomised, controlled trial evaluating two approaches to the management of patient-reported data: (1) team monitoring, symptom monitoring by the clinical team, with nursing outreach if symptoms exceed normal limits, and (2) enhanced feedback, real-time feedback to patients about expected symptom severity, with patient-activated care as needed.Patients with breast, gynaecologic, urologic, and head and neck cancer undergoing ambulatory cancer surgery (n=2750) complete an electronic survey for up to 30 days after surgery that includes items from a validated instrument developed by the National Cancer Institute, the Patient-Reported Outcomes version of the Common Terminology Criteria for Adverse Events (PRO-CTCAE). Information provided to patients in the Enhanced Feedback group is procedure-specific and based on updated PRO-CTCAE data from previous patients. Qualitative interviews are also performed. The primary study outcomes assess unplanned emergency department visits and symptom-triggered interventions (eg, nursing calls and pain management referrals) within 30 days, and secondary outcomes assess the patient and caregiver experience (ie, patient engagement, patient anxiety and caregiver burden).Ethics and disseminationThis study is approved by the Institutional Review Board at Memorial Sloan Kettering Cancer Center. The relationships between the study team and stakeholders will be leveraged to disseminate study findings. Findings will be relevant in designing future coordinated care models targeting improved healthcare quality and patient experience.Trial registration numberNCT03178045
APA, Harvard, Vancouver, ISO, and other styles
46

Kim, Taehoon, Bang Chul Jung, and Dan Keun Sung. "An Enhanced Random Access With Distributed Pilot Orthogonalization for Cellular IoT Networks." IEEE Transactions on Vehicular Technology 69, no. 1 (January 2020): 1152–56. http://dx.doi.org/10.1109/tvt.2019.2950993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Trestian, Ramona, Olga Ormond, and Gabriel-Miro Muntean. "Enhanced Power-Friendly Access Network Selection Strategy for Multimedia Delivery Over Heterogeneous Wireless Networks." IEEE Transactions on Broadcasting 60, no. 1 (March 2014): 85–101. http://dx.doi.org/10.1109/tbc.2014.2301282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jung, Seunghwa, and Jihwan P. Choi. "Reliability of Small Satellite Networks With Software-Defined Radio and Enhanced Multiple Access Protocol." IEEE Transactions on Aerospace and Electronic Systems 57, no. 3 (June 2021): 1891–902. http://dx.doi.org/10.1109/taes.2021.3050652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Abbas, Ghulam, Ziaul Haq Abbas, Shahab Haider, Thar Baker, Saadi Boudjit, and Fazal Muhammad. "PDMAC: A Priority-Based Enhanced TDMA Protocol for Warning Message Dissemination in VANETs." Sensors 20, no. 1 (December 19, 2019): 45. http://dx.doi.org/10.3390/s20010045.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) are the key enabling technology for intelligent transportation systems. Carrier-sense multiple access with collision avoidance (CSMA/CA) is the de facto media access standard for inter-vehicular communications, but its performance degrades in high-density networks. Time-division multiple access (TDMA)-based protocols fill this gap to a certain extent, but encounter inefficient clock synchronization and lack of prioritized message delivery. Therefore, we propose a priority-based direction-aware media access control (PDMAC) as a novel protocol for intra-cluster and inter-cluster clock synchronization. Furthermore, PDMAC pioneers a three-tier priority assignment technique to enhance warning messages delivery by taking into account the direction component, message type, and severity level on each tier. Analytical and simulation results validate the improved performance of PDMAC in terms of clock synchronization, channel utilization, message loss rate, end-to-end delays, and network throughput, as compared with eminent VANET MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
50

Najoui, Mohamed, Anas Hatim, Said Belkouch, and Noureddine Chabini. "Novel Implementation Approach with Enhanced Memory Access Performance of MGS Algorithm for VLIW Architecture." Journal of Circuits, Systems and Computers 29, no. 12 (February 19, 2020): 2050200. http://dx.doi.org/10.1142/s021812662050200x.

Full text
Abstract:
Modified Gram–Schmidt (MGS) algorithm is one of the most-known forms of QR decomposition (QRD) algorithms. It has been used in many signal and image processing applications to solve least square problem and linear equations or to invert matrices. However, QRD is well-thought-out as a computationally expensive technique, and its sequential implementation fails to meet the requirements of many real-time applications. In this paper, we suggest a new parallel version of MGS algorithm that uses VLIW (Very Long Instruction Word) resources in an efficient way to get more performance. The presented parallel MGS is based on compact VLIW kernels that have been designed for each algorithm step taking into account architectural and algorithmic constraints. Based on instruction scheduling and software pipelining techniques, the proposed kernels exploit efficiently data, instruction and loop levels parallelism. Additionally, cache memory properties were used efficiently to enhance parallel memory access and to avoid cache misses. The robustness, accuracy and rapidity of the introduced parallel MGS implementation on VLIW enhance significantly the performance of systems under severe rea-time and low power constraints. Experimental results show great improvements over the optimized vendor QRD implementation and the state of art.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography