Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
4801
-
4802
Balancing Long Lifetime and Satisfying Fairness in WBAN Using a Constrained Markov Decision Process
Published 2015-01-01“…As an important part of the Internet of Things (IOT) and the special case of device-to-device (D2D) communication, wireless body area network (WBAN) gradually becomes the focus of attention. …”
Get full text
Article -
4803
Dual-Band Microstrip Patch Antenna Miniaturization Using Metamaterial
Published 2013-01-01“…Proposed antenna covers applications in mobile communication and Wi-MAX. Proposed patch antenna is compared with the conventional patch antenna, which shows the significant miniaturization as compared to conventional patch antenna.…”
Get full text
Article -
4804
-
4805
Nonverbal Behavior of Service Robots in Social Interactions – A Survey on Recent Studies.
Published 2024-06-01“… This study presents a literature review focused on nonverbal communication in human-robot interaction (HRI) that involves service robots with social capabilities. …”
Get full text
Article -
4806
An Optimal Operating Strategy for Battery Life Cycle Costs in Electric Vehicles
Published 2014-01-01Get full text
Article -
4807
-
4808
Compressed Sensing Based Fingerprint Identification for Wireless Transmitters
Published 2014-01-01Get full text
Article -
4809
An Unusual Complication in Plastic Periodontal Surgery
Published 2020-01-01“…While preparing the recipient bed for the graft, an oroantral communication was created. Schneiderian membrane was sutured to reduce the dimension of the communication and covered with a connective tissue graft. …”
Get full text
Article -
4810
Study on Temperature Field Massive Concrete in Early Age Based on Temperature Influence Factor
Published 2020-01-01Get full text
Article -
4811
Model and Algorithm for Dependent Activity Schedule Optimization Combining with BIM
Published 2020-01-01“…Then, the overlap and communication strategies are decided by calculating the maximum revenue using Monte Carlo simulation and MATLAB based on overlap cost, communication cost, rework cost, and reward amount. …”
Get full text
Article -
4812
Fragmented care in lupus: Patient experiences and insights
Published 2025-01-01“…This study explores the experiences of individuals living with SLE regarding the communication and collaboration among their healthcare providers. …”
Get full text
Article -
4813
KARL JASPERS'IN FELSEFESİNDE İNSANIN VAROLUŞUNU GERÇEKLEŞTİRMESİ OLARAK İLETİŞİM
Published 2002-07-01“…In Jaspers' view of existential communication man is not an instrument but an aim.…”
Get full text
Article -
4814
A Multiband Monopole Antenna with the Inverted-Trapezoidal CPW Feeding
Published 2014-01-01Get full text
Article -
4815
Agents of sustainable change: the importance of leadership and responsibility in corporate sustainability
Published 2025-01-01“…How sustainability in organizations is perceived and implemented, depends on diverse factors such as management practices, communication, individual attitudes, and behaviors of leaders and employees. …”
Get full text
Article -
4816
Estimating Body Related Soft Biometric Traits in Video Frames
Published 2014-01-01Get full text
Article -
4817
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01“…When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. …”
Get full text
Article -
4818
Multi-Channel Packet-Analysis System Based on IEEE 802.15.4 Packet-Capturing Modules
Published 2014-09-01Get full text
Article -
4819
A Low Computational Complexity SML Estimation Algorithm of DOA for Wireless Sensor Networks
Published 2015-10-01Get full text
Article -
4820
Victim Verification with the Use of Deep Metric Learning in DVI System Supported by Mobile Application
Published 2025-01-01Get full text
Article