Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
26821
Fingerprint template protection by adopting random projection based on re-encryption
Published 2018-02-01Get full text
Article -
26822
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01Get full text
Article -
26823
-
26824
Design and implementation of a model for OS kernel integrity protection
Published 2015-11-01Get full text
Article -
26825
Survey of research on abnormal traffic detection for software defined networks
Published 2024-03-01Get full text
Article -
26826
Mimic defense authentication method for physical access control
Published 2020-06-01Get full text
Article -
26827
Heterogeneous resource cooperative game in space-ground computing power network
Published 2023-12-01Get full text
Article -
26828
Research of dynamic gesture recognition based on multi-instance learning of kinematics features
Published 2017-11-01Get full text
Article -
26829
HDFS-oriented cryptographic key resource control mechanism
Published 2022-09-01Get full text
Article -
26830
Period dividing opportunistic networks mobility model based on human realistic scenarios
Published 2013-08-01Get full text
Article -
26831
Congestion control algorithm for unreliable unicast traffic
Published 2008-01-01Get full text
Article -
26832
Block-based fair payment scheme under delegation computation
Published 2020-03-01Get full text
Article -
26833
-
26834
Optimization strategy on coverage control in wireless sensor network based on Voronoi
Published 2013-09-01Get full text
Article -
26835
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Published 2020-04-01Get full text
Article -
26836
Personalized requirements oriented trustworthy services recommendation based on social network
Published 2013-12-01Get full text
Article -
26837
-
26838
Novel extended cyclic MUSIC algorithm based on uniform circular array
Published 2014-02-01Get full text
Article -
26839
Voltage Controlled Intertwined Spiral Arrays for Reconfigurable Metasurfaces
Published 2014-01-01Get full text
Article -
26840
Low frequency acoustic source imaging method based on coprime position non-synchronous measurement
Published 2023-09-01Get full text
Article