Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
25401
-
25402
Record matching method based on local CON model in distributed database
Published 2011-01-01Get full text
Article -
25403
Research of authentication techniques for the Internet of things
Published 2020-07-01Get full text
Article -
25404
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Get full text
Article -
25405
Differential fault attack on lightweight block cipher Klein
Published 2016-10-01Get full text
Article -
25406
Packet-based routing algorithm in DTN based on the intimacy between nodes
Published 2014-12-01Get full text
Article -
25407
Spectrum allocation of cognitive wireless network based on immune clone selection optimization
Published 2010-01-01Get full text
Article -
25408
New interest-sensitive and network-sensitive method for user recommendation
Published 2015-02-01Get full text
Article -
25409
-
25410
-
25411
-
25412
Fast view synthesis optimization algorithm based on texture smoothness
Published 2016-03-01Get full text
Article -
25413
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01Get full text
Article -
25414
-
25415
Approach to deep Web data acquiring based on circular strategy and dynamic knowledge
Published 2012-10-01Get full text
Article -
25416
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Get full text
Article -
25417
Approach to early detection and defense against internet worms
Published 2007-01-01Get full text
Article -
25418
Chaos-based scramble self-embedding watermarking algorithm
Published 2006-01-01Get full text
Article -
25419
-
25420