Suggested Topics within your search.
Suggested Topics within your search.
- Women 3
- Communicable diseases 2
- Congresses 2
- Health and hygiene 2
- Management 2
- Medicine 2
- Mental retardation 2
- Prevention 2
- Administration 1
- Anesthesia 1
- Anesthesiology 1
- Biotechnology 1
- Causes 1
- Chemical engineering 1
- Children 1
- Criminal law 1
- Critical Care Nursing 1
- Critical Illness 1
- Death 1
- Education, Higher 1
- Educational leadership 1
- Energy development 1
- English 1
- Feminism 1
- Forests and forestry 1
- Globalization 1
- Groundwater 1
- Industrial microbiology 1
- Industrial procurement 1
- Intraoperative Complications 1
-
124141
-
124142
Analysis and construction for threshold signature scheme based on game theory
Published 2015-05-01Get full text
Article -
124143
-
124144
Research on GPS geometry-based observational stochastic error model
Published 2019-09-01Get full text
Article -
124145
-
124146
-
124147
Research on alert correlation method based on alert confidence in multi-IDS environment
Published 2011-01-01Get full text
Article -
124148
Novel algorithm for dynamic bandwidth scheduling in WDM EPON
Published 2012-02-01Get full text
Article -
124149
Cutaneous pseudolymphoma successfully treated with intralesional triamcinolone acetonide: A case report
Published 2025-01-01Get full text
Article -
124150
Research on mapping method of logical carrying network across multiple domains
Published 2012-08-01Get full text
Article -
124151
-
124152
Editorial: Spatio-temporal molecular mechanisms regulating synapse function and neural circuit dynamics
Published 2025-02-01Get full text
Article -
124153
-
124154
-
124155
Simulation of Flow in Turbopump Vaneless and Vaned Diffusers with Fluid Injection
Published 2000-01-01Get full text
Article -
124156
-
124157
Record matching method based on local CON model in distributed database
Published 2011-01-01Get full text
Article -
124158
Research of authentication techniques for the Internet of things
Published 2020-07-01Get full text
Article -
124159
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Get full text
Article -
124160