Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
27221
Survey on decentralized security-enhanced technologies for RPKI
Published 2024-07-01Get full text
Article -
27222
Time series generation model based on multi-discriminator generative adversarial network
Published 2022-10-01Get full text
Article -
27223
-
27224
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01Get full text
Article -
27225
Blockchain-based distributed EHR fine-grained traceability scheme
Published 2021-05-01Get full text
Article -
27226
Online energy-efficient node selection algorithm for cooperative sensing in cognitive radio networks
Published 2012-07-01Get full text
Article -
27227
-
27228
-
27229
-
27230
-
27231
Research on self-training neural machine translation based on monolingual priority sampling
Published 2024-04-01Get full text
Article -
27232
Few-shot cybersecurity event detection method by data augmentation with prompting question answering
Published 2024-08-01Get full text
Article -
27233
CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory
Published 2023-03-01Get full text
Article -
27234
SenLeash:a restricted defense mechanism against wormhole attacks in wireless sensor network
Published 2013-10-01Get full text
Article -
27235
-
27236
-
27237
Compound event barrier coverage in wireless sensor network
Published 2017-06-01Get full text
Article -
27238
Multi-level loss object tracking adversarial attack method based on spatial perception
Published 2021-11-01Get full text
Article -
27239
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Get full text
Article -
27240
Analysis of influence of ionosphere and troposphere model on RAIM availability of COMPASS
Published 2015-03-01Get full text
Article