Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Social media 3
- Computer security 2
- Information technology 2
- Internet 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Social networks 2
- Access control 1
- Binnary 1
- Business networks 1
- COMPUTERS / Desktop Applications / Suites 1
- Censorship 1
- Cloud computing 1
- Computer network protocols 1
- Computer software 1
- Computer systems 1
- Cultural policy 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Digital Circuits 1
- Distributed processing 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic data processing 1
- Ethnicity 1
-
3141
Key Problems and Solutions Research on Interworking Between Mobile Network and WLAN
Published 2013-05-01Subjects: Get full text
Article -
3142
Cognitive network routing algorithm based on service awareness and policy choice
Published 2011-11-01Subjects: “…cognitive network…”
Get full text
Article -
3143
SEEG-Based Bilateral Seizure Network Analysis for Neurostimulation Treatment
Published 2025-01-01Subjects: Get full text
Article -
3144
Analysis of the spatial distribution of Police Stations on services to vulnerable urban areas (Case Study: Urmia City)
Published 2024-09-01Subjects: Get full text
Article -
3145
Wireless secure enhancement with cooperative jamming
Published 2017-02-01Subjects: Get full text
Article -
3146
DeepRD:LSTM-based Siamese network for Android repackaged applications detection
Published 2018-08-01Subjects: Get full text
Article -
3147
Molecular network analysis for detecting HIV transmission clusters: insights and implications
Published 2025-01-01Subjects: Get full text
Article -
3148
Artificial Intelligence in Energy Economics Research: A Bibliometric Review
Published 2025-01-01Subjects: Get full text
Article -
3149
Intelligent adaptation and integrated scheduling method for computing and networking resources
Published 2023-08-01Subjects: “…computing and network convergence…”
Get full text
Article -
3150
Interaction based on method for spam detection in online social networks
Published 2015-07-01Subjects: Get full text
Article -
3151
Cantelli’s Bounds for Generalized Tail Inequalities
Published 2025-01-01Subjects: Get full text
Article -
3152
Distributed hue recognition based k connectivity path detection in WSN
Published 2018-02-01Subjects: Get full text
Article -
3153
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: “…network security…”
Get full text
Article -
3154
Optimization and application of 5G bearer network backhaul bandwidth estimation model
Published 2020-06-01Subjects: “…5G bearer network…”
Get full text
Article -
3155
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01Subjects: Get full text
Article -
3156
Number transformation design for SGCC IMS administrative switching network
Published 2017-09-01Subjects: “…administrative switching network…”
Get full text
Article -
3157
Improved grey wolf optimization algorithm based service function chain mapping algorithm
Published 2022-11-01Subjects: “…network function virtualization…”
Get full text
Article -
3158
Application of microwave six-port in software radio
Published 2005-01-01Subjects: “…microwave six-port network…”
Get full text
Article -
3159
Cache replacement strategy based on content value
Published 2018-11-01Subjects: “…content-centric networking…”
Get full text
Article -
3160
Key technologies and development of 5G bearer network
Published 2020-09-01Subjects: “…smart transport network…”
Get full text
Article