Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
24461
Elimination of pulse-noise from mixed-noise based on fractional lower order ICA
Published 2011-01-01Get full text
Article -
24462
Approach of detecting LDoS attack based on time window statistic
Published 2010-01-01Get full text
Article -
24463
-
24464
Multipath traffic splitting algorithm based on adaptive granularity
Published 2015-01-01Get full text
Article -
24465
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01Get full text
Article -
24466
-
24467
-
24468
New cognitive radio channel model and the analysis of its capacity
Published 2010-01-01Get full text
Article -
24469
Service chain mapping algorithm based on reinforcement learning
Published 2018-01-01Get full text
Article -
24470
-
24471
Bit-allocation and rate-control algorithm for stereo video coding
Published 2007-01-01Get full text
Article -
24472
Research on linearization modeling technology based on large-signal scattering function
Published 2008-01-01Get full text
Article -
24473
Unified study on the decomposition for deterministic signals and stationary random signals
Published 2016-10-01Get full text
Article -
24474
Architecture of vulnerability discovery technique for information systems
Published 2011-01-01Get full text
Article -
24475
Location privacy preservation approach towards to content sharing on mobile online social network
Published 2016-11-01Get full text
Article -
24476
Method for determining the lengths of protocol keywords based on maximum likelihood probability
Published 2016-06-01Get full text
Article -
24477
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01Get full text
Article -
24478
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
Published 2015-10-01Get full text
Article -
24479
Signal characterization and application of UHF RFID system
Published 2009-01-01Get full text
Article -
24480
Research on the cloud services provider-oriented services selection method
Published 2012-09-01Get full text
Article