Suggested Topics within your search.
Suggested Topics within your search.
- Foreign economic relations 2
- History 2
- YOUNG ADULT FICTION / Fantasy / Historical 2
- YOUNG ADULT FICTION / Historical / Asia 2
- Buddhism 1
- Chemical weapons 1
- Chinese 1
- Cultural assimilation 1
- Description and travel 1
- Diversity in the workplace 1
- Drawings 1
- Droit 1
- Economic aspects 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Emigration and immigration 1
- Foreign workers, Chinese 1
- Immigrants 1
- Language 1
- Law 1
- Mass media 1
- Medical laws and legislation 1
- Moral and ethical aspects 1
- Murder 1
- Mystery and detective stories 1
- Médecine 1
- Occultism 1
- Painting 1
- Parapsychology 1
-
43801
Study and Applying of Search Engine Technique in Mobile Internet Music
Published 2015-02-01“…The music business of China Telecom have high performance, more reasonable precision ratio and recall ratio, timeliness of indexing and other needs in music search to meet the requirements for mobile internet users. …”
Get full text
Article -
43802
-
43803
The Medical Life of Henry Norman Bethune
Published 2015-01-01“…In the People’s Republic of China, he is idolized and remains the only foreigner to ever become a national hero.…”
Get full text
Article -
43804
On Distribution Reduction and Algorithm Implementation in Inconsistent Ordered Information Systems
Published 2014-01-01Get full text
Article -
43805
A Generalized Nonlinear Gronwall-Bellman Inequality with Maxima in Two Variables
Published 2013-01-01Get full text
Article -
43806
Traveling Wave Solutions of the Kadomtsev-Petviashvili-Benjamin-Bona-Mahony Equation
Published 2014-01-01Get full text
Article -
43807
Technology Transfer Through Company Takeovers by Chinese Investors
Published 2020-08-01“…Moreover, there are numerous indications that such take-overs aim for a transfer of technology for industrial policy reasons. This favours China’s rapid technological catch-up, which could lead to a loss of prosperity in the industrialised countries, as is suggested by relevant trade models whose assumptions do not appear unrealistic on closer examination. …”
Get full text
Article -
43808
-
43809
Technology of WLAN in Operation Level Based on Metropolitan Area Network
Published 2015-10-01“…As an extension of the cable broadband network,WLAN is also an important part of the wireless broadband network.In recent years,local governments have put forward the construction of “wireless city”as the fifth city public infrastructure,China Telecom Co.Ltd.also put forward the WLAN construction as the forth basic network.These factors promoted the large-scale construction and development of WLAN.The construction goal and the network architecture of WLAN based on metropolitan area network were analyzed.The networking technologies and the security policy deployment of WLAN were proposed.…”
Get full text
Article -
43810
Generalized Jordan N-Derivations of Unital Algebras with Idempotents
Published 2021-01-01Get full text
Article -
43811
Future of Telecom and Thinkings on De-Telecom
Published 2013-02-01“…The paper started from the great changes of China telecom networks over the past 14 years and analyzed the past and present of telecom industry,and concluded the necessity of transformation. …”
Get full text
Article -
43812
Sufficient and Necessary Conditions of Complete Convergence for Weighted Sums of PNQD Random Variables
Published 2012-01-01Get full text
Article -
43813
Research on Satellite Internet Security Protection Based on Zero Trust
Published 2021-09-01“…Satellite internet, as a new infrastructure, is an important part of China's future information infrastructure, and its security importance is self-evident.Based on the typical architecture of satellite internet system, the security risks faced by satellite platform control, satellite digital transmission and satellite communication were analyzed, the satellite internet security protection architecture based on zero trust was put forward.The implementation process of zero trust security protection architecture in satellite control, digital transmission and communication typical application scenarios, and its advantages compared with the traditional security protection architecture were described.…”
Get full text
Article -
43814
-
43815
The crystal structure of 2-amino-3-carboxypyridin-1-ium iodide hemihydrate, C6H8IN2O2.5
Published 2021-09-01Get full text
Article -
43816
Asymptotic Stability of Impulsive Reaction-Diffusion Cellular Neural Networks with Time-Varying Delays
Published 2012-01-01Get full text
Article -
43817
Delta Shock Waves for a Linearly Degenerate Hyperbolic System of Conservation Laws of Keyfitz-Kranzer Type
Published 2013-01-01Get full text
Article -
43818
-
43819
Hermite–Hadamard and Fractional Integral Inequalities for Interval-Valued Generalized p-Convex Function
Published 2020-01-01Get full text
Article -
43820
Mobility management of the 6G satellite IoT:challenges and key techniques
Published 2020-03-01Get full text
Article