Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
12381
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
Published 2010-10-01“…Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. …”
Get full text
Article -
12382
Applying Noise-Based Reverse Correlation to Relate Consumer Perception to Product Complex Form Features
Published 2022-01-01“…The results provide meaningful information about the car attributes involved in communicating this idea, thus validating the use of the technique in this particular case. …”
Get full text
Article -
12383
HUMAN INACTIVITY IN THE CONTEXT OF SUBJECT’S IDENTITY PROBLEM
Published 2013-09-01“…Grave cause of human inactivity is personal identity, that obstructing communicative, mental and practical agency. Therefore, how the alternative of classical and pluralistic conceptions of identity is the special form of identity, that ground on the subject’s Selfhood – being-in-world.…”
Get full text
Article -
12384
Understanding Large-Scale Social Relationship Data by Combining Conceptual Graphs and Domain Ontologies
Published 2021-01-01“…People worldwide communicate online and create a great amount of data on social media. …”
Get full text
Article -
12385
Wideband Omnidirectional Slotted-Waveguide Antenna Array Based on Trapezoidal Slots
Published 2019-01-01“…The proposed antenna array and its enabling techniques present themselves as promising solutions for mm-wave application, including 5G enhanced mobile broadband (eMBB) communications.…”
Get full text
Article -
12386
Exacerbating Guillain–Barré Syndrome Eight Days after Vector-Based COVID-19 Vaccination
Published 2021-01-01“…Exacerbation of Guillain–Barré syndrome (GBS) shortly after COVID-19 vaccination has not been communicated. The patient is a 32-year-old male who developed progressive sensory disturbances and muscle weakness 8 days after the first dosage of a vector-based vaccine. …”
Get full text
Article -
12387
Risk Measurement for Portfolio Credit Risk Based on a Mixed Poisson Model
Published 2014-01-01“…Experiences manifest the importance of comovement and communicable characters among the risks of financial assets. …”
Get full text
Article -
12388
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01Get full text
Article -
12389
Supplementary High-Input Impedance Voltage-Mode Universal Biquadratic Filter Using DVCCs
Published 2012-01-01Get full text
Article -
12390
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Published 2015-01-01Get full text
Article -
12391
-
12392
-
12393
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Published 2024-12-01Get full text
Article -
12394
Integrating robotic surgery and pharmacotherapy: A dual approach to lung cancer management
Published 2024-01-01Get full text
Article -
12395
-
12396
-
12397
Single CDTA-Based Current Mode All-Pass Filter and Its Applications
Published 2011-01-01Get full text
Article -
12398
Pedestrian trajectory prediction method based on group perception
Published 2024-12-01Get full text
Article -
12399
-
12400
Cross-chain medical data sharing scheme based on elliptic curve signcryption
Published 2024-12-01Get full text
Article