Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
62881
NMT-translation – basic models, quality assessment
Published 2025-01-01“…The study aims to identify the advantages and limitations of existing NMT technologies, as well as to identify areas for their further improvement. …”
Get full text
Article -
62882
Digital leadership in quantity surveying: unveiling key characteristics and their role in driving digital transformation
Published 2023-12-01“… This study delves into the critical role of digital leadership in driving digital transformation within the quantity surveying profession, which is increasingly influenced by technological advancements and the 4th Industrial Revolution imperatives. …”
Get full text
Article -
62883
-
62884
-
62885
-
62886
-
62887
-
62888
-
62889
Microplastics in beach sediments, seawater, and common fish in tourist destinations
Published 2024-10-01Get full text
Article -
62890
Supportive parenting and adolescents digital citizenship behaviors: The mediating role of self-regulation
Published 2025-01-01Get full text
Article -
62891
-
62892
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01“…This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. …”
Get full text
Article -
62893
-
62894
Sufficient statistics for the Pareto distribution parameter
Published 2021-06-01Get full text
Article -
62895
EVOLUTION OF THE ROTATIONAL MOTION OF A SATELLITE WITH FLEXIBLE VISCOELASTIC RODS ON THE ELLIPTIC ORBIT
Published 2018-08-01Get full text
Article -
62896
A Unified Shape-From-Shading Approach for 3D Surface Reconstruction Using Fast Eikonal Solvers
Published 2020-01-01Get full text
Article -
62897
-
62898
Wetting and interfacial reactions: Experimental study of the Sb-Sn-X (X = Cu, Ni) systems
Published 2018-01-01Get full text
Article -
62899
Cavernous Breast Hemangioma Mimicking an Invasive Lesion on Contrast-Enhanced MRI
Published 2019-01-01Get full text
Article -
62900
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Published 2015-01-01Get full text
Article