-
241
-
242
-
243
-
244
Task-based access control mode of peer-to-peer network based on fuzzy theory
Published 2017-02-01Get full text
Article -
245
Joint trade-off optimization algorithm based on cooperative spectrum sensing throughput
Published 2011-11-01Get full text
Article -
246
Gastrocolic fistula after neonatal necrotizing enterocolitis
Published 2025-02-01Get full text
Article -
247
A security authentication scheme in RFID system for smart park
Published 2016-02-01Get full text
Article -
248
Surgical site infection secondary to caesarean section: A case report of unrecognized pyoderma gangrenosum
Published 2025-02-01Get full text
Article -
249
-
250
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01Get full text
Article -
251
-
252
Industrial Application Incubation Platform Based on PaaS Model of Cloud Computing
Published 2015-07-01Get full text
Article -
253
-
254
Analytic two-loop four-point form factor of the stress-tensor supermultiplet in N $$ \mathcal{N} $$ = 4 SYM
Published 2025-02-01Get full text
Article -
255
Determine the Relative Aromaticity of Bilayer Graphyne, Bilayer Graphdiyne, and Bilayer Graphtriyne
Published 2025-01-01Get full text
Article -
256
-
257
Study on Vibration Reduction Method by Gear Staggering Phase Tuning
Published 2023-08-01Get full text
Article -
258
Two-stage rolling optimization operation strategy for microgrid considering BESU state
Published 2025-04-01Get full text
Article -
259
Design and analysis of telecom service platform reconstruction based on open source software
Published 2017-05-01Get full text
Article -
260
Turbo detection-decoding method for bit-interleavered random layered space-time codes
Published 2006-01-01Get full text
Article