Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
28221
-
28222
Indoor carrier phase positioning algorithm based on time-varying clock error elimination
Published 2021-09-01Get full text
Article -
28223
Distributed trust management scheme based on blockchain in Internet of vehicles
Published 2023-05-01Get full text
Article -
28224
Study on optimization strategy for hybrid underlay/overlay spectrum sharing based on queuing model
Published 2017-09-01Get full text
Article -
28225
Super group peer selection algorithm in hybrid layered P2P streaming system based on evolutionary game
Published 2013-12-01Get full text
Article -
28226
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01Get full text
Article -
28227
Leftover bandwidth-aware peer selection algorithm for inter-datacenter content distribution
Published 2013-07-01Get full text
Article -
28228
Method to calculate the diameter of undirected double-loop networks G(N;±1,±s)
Published 2007-01-01Get full text
Article -
28229
Research on inter-core crosstalk characteristics of real multi-core fibers with multi-core excitation
Published 2022-11-01Get full text
Article -
28230
Approach of location privacy protection based on order preserving encryption of the grid
Published 2017-07-01Get full text
Article -
28231
MAC mechanism based on link prediction and network coding
Published 2016-01-01Get full text
Article -
28232
Grid self-attention mechanism 3D object detection method based on raw point cloud
Published 2023-10-01Get full text
Article -
28233
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01Get full text
Article -
28234
SCLF algorithm for polar code based on GRU network assistance and path metric exchange
Published 2023-06-01Get full text
Article -
28235
Chinese medical named entity recognition model based on local enhancement
Published 2024-07-01Get full text
Article -
28236
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01Get full text
Article -
28237
-
28238
DPM-based method for tracking maneuvering targets in wireless sensor networks
Published 2010-01-01Get full text
Article -
28239
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01Get full text
Article -
28240
Research of power preprocessing optimization-based template attack on LED
Published 2014-03-01Get full text
Article