Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
27701
Business process mining based insider threat detection system
Published 2016-10-01Get full text
Article -
27702
Track-Before-Detect Procedures in AM Radio-Based Passive Radar
Published 2021-01-01Get full text
Article -
27703
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Get full text
Article -
27704
Collision analysis of the GMR-2 cipher used in the satellite phone
Published 2018-02-01Get full text
Article -
27705
Revocable and traceable key-policy attribute-based encryption scheme
Published 2018-11-01Get full text
Article -
27706
RCS Computation by Parallel MoM Using Higher-Order Basis Functions
Published 2012-01-01Get full text
Article -
27707
Service recommendation method based on context-embedded support vector machine
Published 2019-09-01Get full text
Article -
27708
Improved embedded wideband speech codec fitting EV-VBR standard
Published 2010-01-01Get full text
Article -
27709
Direct localization algorithm of the aerial target based on external radiation source
Published 2023-06-01Get full text
Article -
27710
Performance of full-rate and partial-diversity multiple antennas space-time block code with low complexity
Published 2005-01-01Get full text
Article -
27711
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01Get full text
Article -
27712
TC<sup>2</sup>-MAC: an adaptive MAC protocol for wireless sensor network
Published 2014-04-01Get full text
Article -
27713
Optimized design of sensing transmission and computing collaborative industrial Internet
Published 2023-06-01Get full text
Article -
27714
-
27715
Denoising recovery for compressive sensing based on selective measure
Published 2017-02-01Get full text
Article -
27716
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01Get full text
Article -
27717
-
27718
Knowledge triple extraction in cybersecurity with adversarial active learning
Published 2020-10-01Get full text
Article -
27719
Dual-station pseudo-Doppler localization method based on particle filtering with stable distribution noise
Published 2016-01-01Get full text
Article -
27720
Adaptive clustering federated learning via similarity acceleration
Published 2024-03-01Get full text
Article