Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
28281
Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature
Published 2024-02-01Get full text
Article -
28282
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01Get full text
Article -
28283
Contact plan design based on bi-directional particle swarm optimization in satellite network
Published 2019-08-01Get full text
Article -
28284
Penetration test method using blind SQL injection based on second-order fragment and reassembly
Published 2017-10-01Get full text
Article -
28285
Optimization and research on RFID anti-collision algorithm based on adaptive multi-dimension division code
Published 2013-09-01Get full text
Article -
28286
Secure and collaborative spectrum sensing scheme based on audit game
Published 2023-12-01Get full text
Article -
28287
Method based on contrastive incremental learning for fine-grained malicious traffic classification
Published 2023-03-01Get full text
Article -
28288
-
28289
-
28290
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01Get full text
Article -
28291
-
28292
-
28293
Optimization and realization of SWIPT relay channel transmission rate based on rateless code
Published 2019-05-01Get full text
Article -
28294
Speaker verification method based on cross-domain attentive feature fusion
Published 2023-08-01Get full text
Article -
28295
Internet complex network separation degree analysis based on hops
Published 2005-01-01Get full text
Article -
28296
Research on Direct Braking Force Estimation and Control Strategy Using Tire Inverse Model
Published 2022-01-01Get full text
Article -
28297
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01Get full text
Article -
28298
Secure beamforming design for IRS-assisted SWIPT Internet of things system
Published 2021-04-01Get full text
Article -
28299
Resource allocation strategy based on deep reinforcement learning in 6G dense network
Published 2023-08-01Get full text
Article -
28300
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01Get full text
Article