Suggested Topics within your search.
Suggested Topics within your search.
- methods 7
- Biochemistry 4
- Evaluation 4
- Information technology 4
- Moral and ethical aspects 4
- Research 4
- Evaluation research (Social action programs) 3
- History and criticism 3
- Methodology 3
- Study and teaching 3
- Anesthesia 2
- Appreciation 2
- Business 2
- Chemistry, Clinical 2
- Data processing 2
- Economic assistance 2
- Economic policy 2
- Education 2
- Experimental fiction 2
- Health and Fitness 2
- History 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Management 2
- Molecular biology 2
- Online social networks 2
- Politics and government 2
- Public administration 2
-
1121
-
1122
Unveiling novel biomarkers for platinum chemoresistance in ovarian cancer
Published 2025-01-01Get full text
Article -
1123
-
1124
Los desastres en México de los 80’s: Miedo, culpa y secuelas psicosociales
Published 2017-12-01Get full text
Article -
1125
Birhythmicity and Hard Excitation from Coupled Synthetic Feedback Loops
Published 2014-01-01Get full text
Article -
1126
A Fast and Validated HPLC Method for Simultaneous Determination of Dopamine, Dobutamine, Phentolamine, Furosemide, and Aminophylline in Infusion Samples and Injection Formulations
Published 2021-01-01“…Interday and intraday accuracy and precision data were recorded in the acceptable limits. The new method has successfully been applied for quantification of all five drugs in their injection dosage form, infusion samples, and for evaluation of the stability of investigated drugs in mixtures for endovenous use. …”
Get full text
Article -
1127
-
1128
RSU-coordinated multichannel MAC protocol in vehicular ad hoc network
Published 2018-11-01Get full text
Article -
1129
Indirection argumentative et mythologie grecque dans l’essai d’Albert Camus
Published 2025-02-01Get full text
Article -
1130
-
1131
A Method for Detecting Overlapping Protein Complexes Based on an Adaptive Improved FCM Clustering Algorithm
Published 2025-01-01Get full text
Article -
1132
Research on Mobile Internet Data Visualization Technology and Application
Published 2014-10-01Subjects: Get full text
Article -
1133
-
1134
Application of Enhanced EWT and Enhanced Dictionary Learning in Bearing Faults Identification
Published 2023-01-01Get full text
Article -
1135
Endogenous security common problems and solutions of the mobile communication networks
Published 2022-09-01“…Based on the understanding of the mobile communication essential characteristics and the mobile communication network inherent characteristics, from a new perspective, the genetic defects existing in the mobile communication network inherent mechanism, especially in the mobility management mechanism were analyzed.These genetic defects would not disappear with the intergenerational development of mobile communication network, therefore, they were also known as endogenous security defects or endogenous security common problems of mobile communication networks.The endogenous security threats that may be introduced by security defects such as “acquiescence in information authenticity” and “ubiquitous data visibility” were pointed out.Under the guidance of the cyberspace endogenous security theory, the ideas and methods to solve the endogenous security common problems in mobile communication networks were proposed, such as breaking the “default trust” with “zero trust” and realizing the “user data limited visibility” with“variable implicit mapping”.…”
Get full text
Article -
1136
-
1137
New Exact Solitary Wave Solutions of a Coupled Nonlinear Wave Equation
Published 2013-01-01Get full text
Article -
1138
-
1139
-
1140
Dynamic resource scheduling strategy for 5G network slicing based on improved greedy algorithm
Published 2018-07-01Get full text
Article