Suggested Topics within your search.
Suggested Topics within your search.
-
1
Brosco-Dutka classification system for palate fistulas
Published 2021-06-01Subjects: Get full text
Article -
2
A Comparative Study of Different FANET 802.11 Wireless Protocols with Different Data Loads
Published 2023-09-01Subjects: Get full text
Article -
3
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature
Published 2021-01-01Subjects: Get full text
Article -
4
RBFT: Resilience-Oriented Blockchain Consensus Protocol
Published 2025-12-01Subjects: Get full text
Article -
5
Hardware‐assisted remote attestation design for critical embedded systems
Published 2023-05-01Subjects: Get full text
Article -
6
Orthodontic retention protocol among Kurdistan Region of Iraq orthodontists
Published 2020-06-01Subjects: “…retention protocols…”
Get full text
Article -
7
-
8
Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks
Published 2025-06-01Subjects: Get full text
Article -
9
Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things
Published 2025-06-01Subjects: Get full text
Article -
10
-
11
-
12
Multi-detector computed tomography (MDCT) diagnostics in total knee arthroplasty: Comparison of different MDCT protocols
Published 2025-01-01Subjects: Get full text
Article -
13
Application of Enhanced Recovery after Surgery Protocols in Colorectal Cancer, Complicated by Malignant Bowel Obstruction: a Review of the Literature
Published 2021-06-01Subjects: “…ERAS protocols…”
Get full text
Article -
14
Protocol for encapsulating ticks to study tick hematophagy and tick-virus-host interactions
Published 2025-09-01Subjects: Get full text
Article -
15
Perioperative systematization for the prevention of hematomas following face-lift procedures: a personal approach based on 1,138 surgical cases
Published 2019-03-01Subjects: Get full text
Article -
16
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
Published 2012-03-01Subjects: “…ormal protocol analysis…”
Get full text
Article -
17
-
18
Holistic Survey on Security in IoT Application Layer: Attacks, Protocols, and Applications
Published 2024-01-01Subjects: Get full text
Article -
19
Interpretations of Ontologies for Breast Cancer
Published 2008-07-01Subjects: Get full text
Article -
20
A critical review of the state of knowledge on factors responsible for the degradation in soils of polyhydroxyalkanoates
Published 2025-08-01Subjects: Get full text
Article