Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
28261
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01Get full text
Article -
28262
-
28263
Distributed abnormal traffic detection method for SDN based on deep learning
Published 2024-11-01Get full text
Article -
28264
Time and energy aware virtual network embedding using Bayesian theory analysis
Published 2016-06-01Get full text
Article -
28265
-
28266
-
28267
Secure federated distillation GAN for CIDS in industrial CPS
Published 2023-12-01Get full text
Article -
28268
Creating non-fungible token (NFT)-backed emoji art from user conversations on blockchain
Published 2025-03-01Get full text
Article -
28269
Non-orthogonal multiple-access system SC-FDMA-IDMA with iterative block equalization
Published 2014-08-01Get full text
Article -
28270
-
28271
-
28272
Optimization of the UWB Feed Antenna Position in Reflector Applications
Published 2014-01-01Get full text
Article -
28273
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Published 2015-12-01Get full text
Article -
28274
Occurrence and Assessment of Chemical Contaminants in Drinking Water in Tunceli, Turkey
Published 2013-01-01Get full text
Article -
28275
Space-time division cluster DoA estimation algorithm based on UWA spread spectrum signal
Published 2022-08-01Get full text
Article -
28276
Identity-based efficient authentication and key agreement protocol for mobile Internet
Published 2017-08-01Get full text
Article -
28277
-
28278
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01Get full text
Article -
28279
-
28280
Zero trust management of data flow between IoT edge nodes based on SDN
Published 2024-07-01Get full text
Article