http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Classifications of Hadiths based on Supervised Learning Techniques
AbdElaal, Hammam M., Bouallegue, Belgacem,Elshourbagy, Motasem,Matter, Safaa S.,AbdElghfar, Hany A.,Khattab, Mahmoud M.,Ahmed, Abdelmoty M. International Journal of Computer ScienceNetwork Security 2022 p.1-10
Digitalization and Diversification of Modern Educational Space (Ukrainian case)
Oksana, Bohomaz, Inna, Koreneva,Valentyn, Lihus,Yanina, Kambalova,Shevchuk, Victoria,Hanna, Tolchieva International Journal of Computer ScienceNetwork Security 2022 p.11-18
Hordieiev, Volodymyr, Shcherbakova, Nadiia,Syryatska, Tetyana,Popov, Yuriy,Сhernyshchuk, Yulia,Pavlenko, Inna International Journal of Computer ScienceNetwork Security 2022 p.19-24
ALMAGHRABI, Emtenan Saud, Alqudah, Derar Mohammed International Journal of Computer ScienceNetwork Security 2022 p.25-32
Food Security through Smart Agriculture and the Internet of Things
Alotaibi, Sara Jeza International Journal of Computer ScienceNetwork Security 2022 p.33-42
Mamchych, Olena, Chornobryva, Natalia,Karskanova, Svitlana,Vlasenko, Karina,Syroiezhko, Olha,Zorochkina, Tetiana,Chychuk, Antonina International Journal of Computer ScienceNetwork Security 2022 p.43-50
Kryshtanovych, Myroslav, Vartsaba, Vira,Kurnosenko, Larysa,Munko, Anna,Chepets, Olha International Journal of Computer ScienceNetwork Security 2022 p.51-56
Anti-Corruption Policy to Ensure Public Order in the State Security System
Shchekhovska, Larysa, Gavrylechko, Yuriy,Vakuliuk, Vasyl,Ivanyuta, Viktoriya,Husarina, Nataliia International Journal of Computer ScienceNetwork Security 2022 p.57-62
Postolenko, Iryna, Biletska, Iryna,Kmit', Olena,Paltseva, Valentyna,Mykhailenko, Olena,Yatsyna, Svitlana,Kuchai, Tetiana International Journal of Computer ScienceNetwork Security 2022 p.63-70
The Role of Computer Technologies in Contemporary Jewelry
Romanenkova, Julia, Bratus, Ivan,Gnatiuk, Liliia,Zaitseva, Veronika,Karpenko, Olga,Misko, Nataliia International Journal of Computer ScienceNetwork Security 2022 p.71-76