-
741
-
742
Unsupervised User Similarity Mining in GSM Sensor Networks
Published 2013-01-01Get full text
Article -
743
Instability Model of a Coal Wall with Large Mining Height under Excavation Unloading Conditions
Published 2020-01-01Get full text
Article -
744
-
745
Hamilton Connectivity of Convex Polytopes with Applications to Their Detour Index
Published 2021-01-01Get full text
Article -
746
Effect of Atmospheric Pressure on Performance of AEA and Air Entraining Concrete
Published 2018-01-01Get full text
Article -
747
Adaptive Reconstruction of a Dynamic Force Using Multiscale Wavelet Shape Functions
Published 2018-01-01Get full text
Article -
748
E-Commerce Logistics Path Optimization Based on a Hybrid Genetic Algorithm
Published 2021-01-01Get full text
Article -
749
Identifying Key Nodes and Enhancing Resilience in Grain Supply Chains Under Drought Conditions
Published 2025-01-01Get full text
Article -
750
Exact Values of Zagreb Indices for Generalized T-Sum Networks with Lexicographic Product
Published 2021-01-01Get full text
Article -
751
-
752
-
753
-
754
Magnetic resonance imaging-based deep learning for predicting subtypes of glioma
Published 2025-01-01Get full text
Article -
755
-
756
-
757
Energy Accumulation and Dissipation of Coal with Preopening under Uniaxial Loading
Published 2021-01-01Get full text
Article -
758
Pharmacokinetic comparisons of S-oxiracetam and R-oxiracetam in beagle dogs
Published 2016-06-01Get full text
Article -
759
A study on coupling and coordination of grain production and agricultural ecological protection in the Yangtze river economic belt
Published 2025-02-01“…In terms of regions, Guizhou has the highest comprehensive level of grain production, and Anhui has the lowest; the region with the highest comprehensive level of agricultural ecological protection is Chongqing, and the lowest is Jiangxi; only Anhui and Hubei have entered high coordination stage, and only Shanghai, Zhejiang, Chongqing, and Yunnan belong to the type of synchronous development. …”
Get full text
Article -
760
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Published 2025-12-01Get full text
Article