Suggested Topics within your search.
Suggested Topics within your search.
-
6241
ANALYTICAL MODEL OF A DIFFERENTIAL METHOD FOR RECEIVING AND PROCESSING SIGNALS OF THE INFRARED RANGE OF WAVELENGTHS
Published 2017-11-01“…Subsequently, from the memory registers portions of a recording signal posted pyrocatechol are selected which are later processed to determine the temporal provisions of minimum minimore and maximum maximore. …”
Get full text
Article -
6242
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Get full text
Article -
6243
Computationally secure steganography based on speech synthesis
Published 2022-06-01Get full text
Article -
6244
-
6245
ADDED VALUES OF SOCIAL CRM: THE EXAMINATION OF CUSTOMER PERSPECTIVE
Published 2015-05-01“…Sampling technique was applied via an online questionnaire containing four sections of questions with a link posted to ensure a greater response rate for analysis. …”
Get full text
Article -
6246
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01Get full text
Article -
6247
-
6248
Efficient verifiable searchable encryption with search and access pattern privacy
Published 2025-01-01Get full text
Article -
6249
A Fast and Effective MIMO Algorithm Using CLR-RNN for Hybrid MDM and WDM Optical Communication System
Published 2024-01-01Get full text
Article -
6250
Hierarchical Embedded System Based on FPGA for Classification of Respiratory Diseases
Published 2025-01-01Get full text
Article -
6251
Analyzing the diffusion of innovation in health communication: a content analysis of the healthy family talk show
Published 2025-02-01“…A content analysis of 35 Instagram posts and radio broadcasts from October to November 2024 was conducted to evaluate the effectiveness of communication and its impact on audience perceptions and behaviors. …”
Get full text
Article -
6252
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01Get full text
Article -
6253
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01Get full text
Article -
6254
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01Get full text
Article -
6255
Unlocking global carbon reduction potential by embracing low-carbon lifestyles
Published 2025-05-01Get full text
Article -
6256
Binary program taint analysis optimization method based on function summary
Published 2023-04-01Get full text
Article -
6257
The Impact of Social Media on the Sustainability of Fashion Industry Marketing
Published 2025-01-01“…Users need large amounts of energy to browse new trends. Posts of trendy fashion items are often shared in groups or circles of friends, increasing the energy needed. …”
Get full text
Article -
6258
-
6259
ADDED VALUES OF SOCIAL CRM: THE EXAMINATION OF CUSTOMER PERSPECTIVE
Published 2015-05-01“…Sampling technique was applied via an online questionnaire containing four sections of questions with a link posted to ensure a greater response rate for analysis. …”
Get full text
Article -
6260
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01Get full text
Article