-
441
-
442
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Get full text
Article -
443
Traceability permissioned chain consensus mechanism based on double-layer architecture
Published 2019-04-01Get full text
Article -
444
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Published 2025-12-01Get full text
Article -
445
The Use of Graph Databases for Artificial Neural Networks
Published 2021-03-01Get full text
Article -
446
Method and Realization of Efficient Extraction of Basic Geological Data from Two-Dimensional Mine Drawings
Published 2021-01-01Get full text
Article -
447
Building a High-Performance Graph Storage on Top of Tree-Structured Key-Value Stores
Published 2024-03-01Get full text
Article -
448
Electronic Medical Record Entity Recognition via Machine Reading Comprehension and Biaffine
Published 2021-01-01Get full text
Article -
449
-
450
-
451
JOB SATISFACTION IN THE DIGITALISATION ERA: A BIBLIOMETRIC ANALYSIS
Published 2024-12-01Get full text
Article -
452
An Improved Real Time Image Detection System for Elephant Intrusion along the Forest Border Areas
Published 2014-01-01Get full text
Article -
453
Sketch-Based Spatial Queries for the Retrieval of Human Locomotion Patterns in Smart Environments
Published 2009-01-01Get full text
Article -
454
-
455
HVSR Analysis of Rockslide Seismic Signals to Assess the Subsoil Conditions and the Site Seismic Response
Published 2018-01-01Get full text
Article -
456
-
457
-
458
The Acquisition of English Vocabulary for Children at Grade III in SD Islam Nurul Hidayah
Published 2020-11-01Get full text
Article -
459
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
Published 2025-01-01Get full text
Article -
460
Discriminating between flint outcrops in central north Bulgaria: archaeological implications
Published 2024-12-01Get full text
Article