Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
6781
Diethyldithiocarbamate-copper complex ignites the tumor microenvironment through NKG2D-NKG2DL axis
Published 2025-02-01Get full text
Article -
6782
-
6783
Space Consolidation for Fishing Settlement in Mariso District, Makassar City with Space Syntax
Published 2019-09-01Get full text
Article -
6784
Biomechanical perspectives on image-based hip fracture risk assessment: advances and challenges
Published 2025-03-01Get full text
Article -
6785
-
6786
-
6787
The state-of-the-art wireless body area sensor networks: A survey
Published 2018-04-01Get full text
Article -
6788
-
6789
-
6790
-
6791
-
6792
Designing Psychological Treatments for Scalability: The PREMIUM Approach.
Published 2015-01-01“…The resources used by PREMIUM were computed in terms of time (months) and monetary costs.…”
Get full text
Article -
6793
Energy and Environmental Benefits of In-Motion Charging Trolleybuses: A Case Study of Vilnius
Published 2025-06-01Get full text
Article -
6794
-
6795
The effect of 4-month cycling trainings performed on elite cyclists on some immunological parameters
Published 2018-08-01“…The control group consisted of individuals who did not regularly exercise and their ages were equivalent to the cyclists. No training program was applied to the control group. The data obtained in the study were analyzed statistically with the SPSS computer package software after being transferred to the electronic medium. …”
Get full text
Article -
6796
-
6797
-
6798
Securing Electrical Drive Systems Against Man-in-the-Middle Attacks Using S-Box Optimized AES Encryption
Published 2025-01-01Get full text
Article -
6799
-
6800
Search for lepton-flavor-violating decays of the tau lepton at a future muon collider
Published 2025-07-01“…Assuming a future muon collider proposed by the Muon Accelerator Program (MAP), we search for LFV decays $\tau\rightarrow\ell a$ ($\ell=e,\mu$) of one of the tau leptons produced in the muon-anti muon annihilation. …”
Get full text
Article