Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
25221
Anomaly domains detection algorithm based on historical data
Published 2016-10-01Get full text
Article -
25222
-
25223
Access control model and its application for collaborative information systems
Published 2008-01-01Get full text
Article -
25224
Small target detection based on modified local reverse entropy operator
Published 2013-04-01Get full text
Article -
25225
Progressive filling partitioning and mapping algorithm for Spark based on allocation fitness degree
Published 2017-09-01Get full text
Article -
25226
-
25227
-
25228
On-demand cooperative spectrum sensing and channel allocation in cognitive wireless networks
Published 2011-11-01Get full text
Article -
25229
Improving DSSS signal PN code phase measurement precision by 3-points quadratic interpolation
Published 2007-01-01Get full text
Article -
25230
-
25231
Android malware detection based on APK signature information feedback
Published 2017-05-01Get full text
Article -
25232
-
25233
Danger theory inspired intrusion detection model for wireless sensor networks
Published 2012-09-01Get full text
Article -
25234
Research on credit counting and risk evaluation for C2C e-commerce
Published 2009-01-01Get full text
Article -
25235
Automated polymorphic worm signature generation approach based on seed-extending
Published 2014-09-01Get full text
Article -
25236
Further research on public-key cryptosystems based on third-order recurrence sequence
Published 2005-01-01Get full text
Article -
25237
Research on analysis model of information systems survivability
Published 2006-01-01Get full text
Article -
25238
Architecture to connect sensor networks with Internet and services provided
Published 2008-01-01Get full text
Article -
25239
Queue stability distributed spectrum access algorithm based on Markov model for cognitive radio network
Published 2014-03-01Get full text
Article -
25240
Hish speed deep packet inspection method with low power dissipation
Published 2011-01-01Get full text
Article