Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
25981
Survey of the Internet of things operating system security
Published 2018-03-01Get full text
Article -
25982
-
25983
Novel full reference perceptual quality metric for audio-visual asynchrony
Published 2012-02-01Get full text
Article -
25984
-
25985
-
25986
Cooperative interference power allocation in physical layer security under imperfect time synchronization
Published 2019-11-01Get full text
Article -
25987
-
25988
Research on intrusion detection system based on two-level algorithm
Published 2005-01-01Get full text
Article -
25989
Survey of controller placement problem in software defined network
Published 2017-07-01Get full text
Article -
25990
Research on the algorithm for reducing the PAPR of OFDM system based on quantum chaotic mapping
Published 2019-01-01Get full text
Article -
25991
Generalized Grad-CAM attacking method based on adversarial patch
Published 2021-03-01Get full text
Article -
25992
-
25993
Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems
Published 2021-12-01Get full text
Article -
25994
CATPE protocol with capture effect for RFID tag anti-collision
Published 2014-07-01Get full text
Article -
25995
Using coverage analysis to extract Botnet command-and-control protocol
Published 2014-01-01Get full text
Article -
25996
Trust model based on reputation for peer-to-peer networks
Published 2008-01-01Get full text
Article -
25997
Load balance multicast routing algorithms on overlay network
Published 2009-01-01Get full text
Article -
25998
Robust image hashing method from global perception features of human visual cortex
Published 2011-01-01Get full text
Article -
25999
-
26000
Explicit construction of girth-eight QC-LDPC codes and its application in CRT method
Published 2012-03-01Get full text
Article