Suggested Topics within your search.
Suggested Topics within your search.
Communications engineering / telecommunications
3
Computer science
2
Electrical engineering
2
NA9000-9284 City planning
2
Algorithms and data structures
1
Coloured-edge graph
1
Data storage
1
Digital signal processing
1
Digital storage
1
Energy
1
Energy efficiency
1
G70.212-70.215 Geographic information system
1
H Social Sciences (General)
1
HD28 Management. Industrial Management
1
Heterogeneous wireless sensor networks
1
History of engineering and technology
1
Hybrid-based TEEN
1
Internet of things
1
Internet protocols
1
IoT
1
Management. Industrial Management
1
Mathematical theory of computation
1
Mobile telecommunication systems
1
Multimodal networks
1
Multipath
1
Multipath link routing protocol
1
Network hardware
1
Network security
1
Power management (telecommunication)
1
Routing protocols
1
-
461by Nel, Nevin Narhan“... these business strategies. The primary objective of this research is to improve the implementation of strategic...”
Published 2012
Get full text
Others -
462“...Asymmetric windows are of increasing interest to researchers because of the nonlinear...”
Get full text
Article -
463by Kiwon Kim, Eun Hye Jang, Ah Young Kim, Maurizio Fava, David Mischoulon, George I. Papakostas, Hyewon Kim, Eun Jin Na, Han Young Yu, Hong Jin Jeon“... biomarkers observed in MDD and PD suggest the need for establishing individualized predictive biomarkers...”
Published 2019-11-01
Get full text
Article -
464“... to establish the mobile telecommunication portal city services staff core ability questionnaire survey...”
Get full text
Others -
465by Valerie Renaudin, Miguel Ortiz, Johan Perul, Joaquin Torres-Sospedra, Antonio Ramon Jimenez, Antoni Perez-Navarro, German Martin Mendoza-Silva, Fernando Seco, Yael Landau, Revital Marbel, Boaz Ben-Moshe, Xingyu Zheng, Feng Ye, Jian Kuang, Yu Li, Xiaoji Niu, Vlad Landa, Shlomi Hacohen, Nir Shvalb, Chuanhua Lu, Hideaki Uchiyama, Diego Thomas, Atsushi Shimada, Rin-Ichiro Taniguchi, Zhenxing Ding, Feng Xu, Nikolai Kronenwett, Blagovest Vladimirov, Soyeon Lee, Eunyoung Cho, Sungwoo Jun, Changeun Lee, Sangjoon Park, Yonghyun Lee, Jehyeok Rew, Changjun Park, Hyeongyo Jeong, Jaeseung Han, Keumryeol Lee, Wenchao Zhang, Xianghong Li, Dongyan Wei, Ying Zhang, So Young Park, Chan Gook Park, Stefan Knauth, Georgios Pipelidis, Nikolaos Tsiamitros, Tomas Lungenstrass, Juan Pablo Morales, Jens Trogh, David Plets, Miroslav Opiela, Shih-Hau Fang, Yu Tsao, Ying-Ren Chien, Shi-Shen Yang, Shih-Jyun Ye, Muhammad Usman Ali, Soojung Hur, Yongwan Park“... indoor localization systems from different research groups worldwide are evaluated empirically...”
Published 2019-01-01
Get full text
Article -
466“... to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication...”
Get full text
Article -
467“... by the petrochemical industry, including the Chinese Petroleum Corporation, followed by the establishment of a Du Pont...”
Get full text
Others -
468by Shinsuke Koike, Saori C. Tanaka, Tomohisa Okada, Toshihiko Aso, Ayumu Yamashita, Okito Yamashita, Michiko Asano, Norihide Maikusa, Kentaro Morita, Naohiro Okada, Masaki Fukunaga, Akiko Uematsu, Hiroki Togo, Atsushi Miyazaki, Katsutoshi Murata, Yuta Urushibata, Joonas Autio, Takayuki Ose, Junichiro Yoshimoto, Toshiyuki Araki, Matthew F. Glasser, David C. Van Essen, Megumi Maruyama, Norihiro Sadato, Mitsuo Kawato, Kiyoto Kasai, Yasumasa Okamoto, Takashi Hanakawa, Takuya Hayashi“..., imaging-based biomarkers are not yet well established for diagnostic and therapeutic use. This article...”
Published 2021-01-01
Get full text
Article -
469“... intervals into time series. A time domain prediction model is established based on the autoregressive model...”
Get full text
Article -
470“... is established and experimentally tested, and the corresponding controlled results are compared with those...”
Get full text
Article -
471“.... To detect APT attack, many researchers established attack models and then correlated IDS logs...”
Get full text
Article -
472“... legitimate receiver, and an eavesdropper is established. The legitimate receiver can perform secure...”
Get full text
Article -
473by Zhang, Xiaohuan“...The thesis aims to examine and explore NPD activities within China and establish whether Western...”
Published 2005
Get full text
-
474
-
475by Sikstrom, Brian Murray“... by the researcher and probably for Canadian urban planners and office location decision-makers. The thesis...”
Published 2010
Get full text
-
476by Wen Wen, Hiroshi Shibata, Ryu Ohata, Atsushi Yamashita, Hajime Asama, Hiroshi Imamizu“.... The processes people actively use to establish their control, while interacting with an environment containing...”
Published 2020-05-01
Get full text
Article -
477by Fernandes, Victor Oliveira“... research question: have the decisions and procedures implemented by the telecommunications regulatory...”
Published 2018
Get full text
-
478“..., the relationship among differential privacy, identifiability privacy, and mutual information privacy is established...”
Get full text
Article -
479by Haigen Yang, Luyang Li, JinXiang Chen, GuiYing Sun, Xiangxin Meng, HongYan Yu, Wenting Xu“..., and the forces acting on the adapter are established. The random factors and their distribution law that greatly...”
Published 2021-02-01
Get full text
Article -
480“... the multi-output controller for multi-MR dampers. In this paper, a T-S fuzzy model is established...”
Get full text
Article