Suggested Topics within your search.
Suggested Topics within your search.
- Foreign economic relations 2
- History 2
- YOUNG ADULT FICTION / Fantasy / Historical 2
- YOUNG ADULT FICTION / Historical / Asia 2
- Buddhism 1
- Chemical weapons 1
- Chinese 1
- Cultural assimilation 1
- Description and travel 1
- Diversity in the workplace 1
- Drawings 1
- Droit 1
- Economic aspects 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Emigration and immigration 1
- Foreign workers, Chinese 1
- Immigrants 1
- Language 1
- Law 1
- Mass media 1
- Medical laws and legislation 1
- Moral and ethical aspects 1
- Murder 1
- Mystery and detective stories 1
- Médecine 1
- Occultism 1
- Painting 1
- Parapsychology 1
-
47261
-
47262
Miniaturized lensless microfluidic on-chip bio-imaging detection
Published 2019-06-01Get full text
Article -
47263
A blood test for Alzheimer’s disease: a decade of progress and success
Published 2025-02-01Get full text
Article -
47264
Approximation Properties of Durrmeyer Type of (p,q)-Bleimann, Butzer, and Hahn Operators
Published 2019-01-01Get full text
Article -
47265
Study and Applying of Search Engine Technique in Mobile Internet Music
Published 2015-02-01“…The music business of China Telecom have high performance, more reasonable precision ratio and recall ratio, timeliness of indexing and other needs in music search to meet the requirements for mobile internet users. …”
Get full text
Article -
47266
-
47267
The Medical Life of Henry Norman Bethune
Published 2015-01-01“…In the People’s Republic of China, he is idolized and remains the only foreigner to ever become a national hero.…”
Get full text
Article -
47268
On Distribution Reduction and Algorithm Implementation in Inconsistent Ordered Information Systems
Published 2014-01-01Get full text
Article -
47269
A Generalized Nonlinear Gronwall-Bellman Inequality with Maxima in Two Variables
Published 2013-01-01Get full text
Article -
47270
Traveling Wave Solutions of the Kadomtsev-Petviashvili-Benjamin-Bona-Mahony Equation
Published 2014-01-01Get full text
Article -
47271
Technology Transfer Through Company Takeovers by Chinese Investors
Published 2020-08-01“…Moreover, there are numerous indications that such take-overs aim for a transfer of technology for industrial policy reasons. This favours China’s rapid technological catch-up, which could lead to a loss of prosperity in the industrialised countries, as is suggested by relevant trade models whose assumptions do not appear unrealistic on closer examination. …”
Get full text
Article -
47272
-
47273
Technology of WLAN in Operation Level Based on Metropolitan Area Network
Published 2015-10-01“…As an extension of the cable broadband network,WLAN is also an important part of the wireless broadband network.In recent years,local governments have put forward the construction of “wireless city”as the fifth city public infrastructure,China Telecom Co.Ltd.also put forward the WLAN construction as the forth basic network.These factors promoted the large-scale construction and development of WLAN.The construction goal and the network architecture of WLAN based on metropolitan area network were analyzed.The networking technologies and the security policy deployment of WLAN were proposed.…”
Get full text
Article -
47274
Expression of female hormone receptor and prognosis of cervical cancer: Does any relationship exist?
Published 2025-01-01Get full text
Article -
47275
Generalized Jordan N-Derivations of Unital Algebras with Idempotents
Published 2021-01-01Get full text
Article -
47276
Future of Telecom and Thinkings on De-Telecom
Published 2013-02-01“…The paper started from the great changes of China telecom networks over the past 14 years and analyzed the past and present of telecom industry,and concluded the necessity of transformation. …”
Get full text
Article -
47277
Sufficient and Necessary Conditions of Complete Convergence for Weighted Sums of PNQD Random Variables
Published 2012-01-01Get full text
Article -
47278
Research on Satellite Internet Security Protection Based on Zero Trust
Published 2021-09-01“…Satellite internet, as a new infrastructure, is an important part of China's future information infrastructure, and its security importance is self-evident.Based on the typical architecture of satellite internet system, the security risks faced by satellite platform control, satellite digital transmission and satellite communication were analyzed, the satellite internet security protection architecture based on zero trust was put forward.The implementation process of zero trust security protection architecture in satellite control, digital transmission and communication typical application scenarios, and its advantages compared with the traditional security protection architecture were described.…”
Get full text
Article -
47279
-
47280
The crystal structure of 2-amino-3-carboxypyridin-1-ium iodide hemihydrate, C6H8IN2O2.5
Published 2021-09-01Get full text
Article