Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 14
- Economic development 7
- Entrepreneurship 6
- Psychological tests 6
- Research 6
- Economic policy 5
- English language 5
- History 5
- Study and teaching 5
- Business enterprises 4
- Industrial management 4
- Information Science 4
- Language 4
- Law 4
- Social aspects 4
- Statistics 4
- information technology 4
- Biochemistry 3
- Computer security 3
- Design 3
- Economic conditions 3
- Globalization 3
- Grammar 3
- Information Technology 3
- Information theory 3
- Internet 3
- Management information systems 3
- Mass media 3
- Methodology 3
-
4101
New attack based on smartwatch motion sensors and the protection method research
Published 2015-11-01Subjects: Get full text
Article -
4102
Survey of key management schemes for cluster networks
Published 2022-12-01Subjects: Get full text
Article -
4103
-
4104
Parameter selection of autocorrelation test for block ciphers
Published 2009-01-01Subjects: “…information security…”
Get full text
Article -
4105
Sarcoma primitivo de mama. Presentación de un caso
Published 2013-06-01Subjects: Get full text
Article -
4106
-
4107
-
4108
MEDIADISCURSIVITY AND MEDIACULTURE OF VISUALIZATION AND CONTENT FILLING OF ADVERTISING TEXTS (ON THE EXAMPLE OF UKRAINIAN CITIES)
Published 2024-12-01Subjects: Get full text
Article -
4109
Konya’daki Aile İşletmelerinin Kurumsallaşmasında Bilgi Teknolojilerinin Önemi
Published 2014-01-01Subjects: Get full text
Article -
4110
MIMO Transmission Mode Adaptation and Performance Verification
Published 2013-05-01Subjects: Get full text
Article -
4111
An instruction dataset for extracting quantum cascade laser properties from scientific textDataverse
Published 2025-02-01Subjects: “…Information extraction…”
Get full text
Article -
4112
Reloading mechanical characteristics of cemented tailings backfill after dynamic loading action
Published 2024-12-01Subjects: Get full text
Article -
4113
How do predatory medical journals try to seduce and fool potential authors?: Analysis of an 18-months monitoring survey
Published 2024-01-01Subjects: Get full text
Article -
4114
Feature dependence graph based source code loophole detection method
Published 2023-01-01Subjects: Get full text
Article -
4115
Key technologies and research progresses in cognitive SWIPT
Published 2020-10-01Subjects: “…simultaneous wireless information and power transfer…”
Get full text
Article -
4116
BİLGİTEKNOLOJİLERİNDEKİGELİŞMELER ÇERÇEVESİNDE BİLGİYE ERİŞİMİN YENİBOYUTLARI
Published 2005-02-01Subjects: Get full text
Article -
4117
Influence maximization algorithm of social networks based on Transformer model
Published 2024-12-01Subjects: Get full text
Article -
4118
Dans le regard de l’Autre : la France et les Français vus d’Angleterre, 1640-1660
Published 2014-07-01Subjects: Get full text
Article -
4119
Research on vulnerability and security technology of industrial Ethernet protocol
Published 2017-11-01Subjects: Get full text
Article -
4120
A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
Published 2025-01-01Subjects: Get full text
Article