Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
24521
Diffusion-based time synchronization protocol for wireless sensor networks
Published 2008-01-01Get full text
Article -
24522
New adaptively secure key-policy attribute-based encryption scheme
Published 2012-09-01Get full text
Article -
24523
Research on cloud storage systems supporting secure sharing
Published 2017-10-01Get full text
Article -
24524
-
24525
Incidence of Pulmonary Disease Caused by Mycobacteria other than Tuberculosis in British Columbia
Published 2002-01-01Get full text
Article -
24526
-
24527
-
24528
-
24529
-
24530
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Get full text
Article -
24531
-
24532
Research on Chinese predicate head recognition based on Highway-BiLSTM network
Published 2021-01-01Get full text
Article -
24533
-
24534
Network packet capture oriented INIC design and implementation
Published 2006-01-01Get full text
Article -
24535
-
24536
Analysis of constant modulus blind equalization algorithms base on "data reuse"
Published 2009-01-01Get full text
Article -
24537
Intrusion detection model of random attention capsule network based on variable fusion
Published 2020-11-01Get full text
Article -
24538
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Published 2014-02-01Get full text
Article -
24539
Quantitative analysis of BGP convergence and its influence on network performance
Published 2007-01-01Get full text
Article -
24540