Suchergebnisse - "Rahman, Abdul"
-
1
Autoren:
Quelle: International Journal Of Engineering And Management Research 12(3):25-29. 2022
-
2
Autoren: et al.
Quelle: Jurnal Kejuruteraan. 37:1859-1865
-
3
Autoren: et al.
Quelle: JURNAL TEKNIK SIPIL CENDEKIA (JTSC). 6:1454-1468
-
4
Autoren: et al.
Quelle: Indian Journal of Public Health Research & Development 10(8):1338-1342. 2019
-
5
Autoren: et al.
Quelle: PREPOTIF : JURNAL KESEHATAN MASYARAKAT; Vol. 9 No. 2 (2025): AGUSTUS 2025; 2940-2948
Dateibeschreibung: application/pdf
-
6
Autoren: et al.
Quelle: 2025 International Wireless Communications and Mobile Computing (IWCMC). :1241-1246
Schlagwörter: FOS: Computer and information sciences, Computer Science - Cryptography and Security, I.2.6, D.4.6, K.6.5, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2505.19364
-
7
Autoren: et al.
Quelle: 2025 International Wireless Communications and Mobile Computing (IWCMC). :643-648
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, I.2.6, D.4.6, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2505.23791
-
8
Autoren: et al.
Quelle: Journal of Teaching and Learning, Vol 19, Iss 2 (2025)
Schlagwörter: ICT, Learning Resources, Teachers, Education
-
9
Autoren:
Quelle: The Journal of Society and Media. 9:320-341
-
10
Autoren: et al.
Quelle: 2025 13th International Symposium on Digital Forensics and Security (ISDFS). :1-6
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2502.19534
-
11
Autoren: et al.
Quelle: Journal of Water and Climate Change. 16:1459-1476
-
12
Autoren:
Quelle: Electronic library, 2020; v.38 n.3:p.513-530
Zugangs-URL: https://doi.org/10.1108/EL-12-2019-0294
-
13
-
14
Autoren: et al.
Quelle: 2025 International Conference on Computing, Networking and Communications (ICNC). :243-248
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2407.19119
-
15
Autoren:
Quelle: Journal of Human Development and Communication (JoHDeC). 13:141-152
-
16
Autoren: et al.
Quelle: 2025 International Conference on Computing, Networking and Communications (ICNC). :510-515
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Zugangs-URL: http://arxiv.org/abs/2412.05183
-
17
-
18
-
19
Autoren:
Quelle: Quantum Journal of Social Sciences and Humanities. 5:51-64
-
20
Autoren: et al.
Quelle: Jurnal Iqra': Kajian Ilmu Pendidikan, Vol 9, Iss 2 (2024)
Schlagwörter: Learning Model, Education (General), L7-991, Improve Competence, Internship Learning Model, Education
Nájsť tento článok vo Web of Science
Full Text Finder