Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Knowledge Driven Paper Recommendation Using Heterogeneous Network Embedding Method
(Articles)
Irfan Ahmed
,
Zubair Ahmed Kalhoro
Journal of Computer and Communications
Vol.6 No.12
,December 28, 2018
DOI:
10.4236/jcc.2018.612016
1,071
Downloads
2,148
Views
Citations
Mapping the Wall-Region Dynamics of High-Flux Gas-Solid Riser Using Scaling Regions from the Solid Concentration Time Series
(Articles)
Justin M. Jeremiah
,
Samwel V. Manyele
,
Abraham K. Temu
,
Jesse-X. Zhu
Engineering
Vol.11 No.1
,January 31, 2019
DOI:
10.4236/eng.2019.111007
550
Downloads
977
Views
Citations
Intrinsic and Extrinsic Automatic Evaluation Strategies for Paraphrase Generation Systems
(Articles)
Tulu Tilahun Hailu
,
Junqing Yu
,
Tessfu Geteye Fantaye
Journal of Computer and Communications
Vol.8 No.2
,February 11, 2020
DOI:
10.4236/jcc.2020.82001
1,065
Downloads
11,636
Views
Citations
On Some Embedment of Groups into Wreath Products
(Articles)
Enoch Suleiman
,
Muhammed Salihu Audu
Advances in Pure Mathematics
Vol.11 No.2
,February 5, 2021
DOI:
10.4236/apm.2021.112007
291
Downloads
1,007
Views
Citations
Review of Text Classification in Deep Learning
(Articles)
Qi Wang
,
Wenling Li
,
Zhezhi Jin
Open Access Library Journal
Vol.8 No.3
,March 25, 2021
DOI:
10.4236/oalib.1107175
591
Downloads
2,867
Views
Citations
The Effect of Supportive Organizational Climate on Employee Turnover Intention: A Cross-Level Analysis
(Articles)
Yanjie Hao
,
Guanghui Wang
Journal of Human Resource and Sustainability Studies
Vol.10 No.3
,August 19, 2022
DOI:
10.4236/jhrss.2022.103021
376
Downloads
1,582
Views
Citations
This article belongs to the Special Issue on
Human Resource Planning
Hybrid Scalable Researcher Recommendation System Using Azure Data Lake Analytics
(Articles)
Dinesh Kalla
,
Nathan Smith
,
Fnu Samaah
,
Kiran Polimetla
Journal of Data Analysis and Information Processing
Vol.12 No.1
,February 8, 2024
DOI:
10.4236/jdaip.2024.121005
71
Downloads
230
Views
Citations
Uncertainty Theory Based Novel Multi-Objective Optimization Technique Using Embedding Theorem with Application to R & D Project Portfolio Selection
(Articles)
Rupak Bhattacharyya
,
Amitava Chatterjee
,
Samarjit Kar
Applied Mathematics
Vol.1 No.3
,September 29, 2010
DOI:
10.4236/am.2010.13023
4,664
Downloads
8,900
Views
Citations
Possibility for Short-Term Forecasting of Japanese Stocks Return by Randomly Distributed Embedding Theory
(Articles)
Seisuke Sugitomo
,
Keiichi Maeta
Journal of Mathematical Finance
Vol.9 No.3
,July 8, 2019
DOI:
10.4236/jmf.2019.93015
635
Downloads
1,763
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,453
Downloads
9,107
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,026
Downloads
2,833
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
241
Downloads
1,893
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,629
Downloads
7,944
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,554
Downloads
6,361
Views
Citations
Nash Embedding of Witten’s M-Theory and the Hawking-Hartle Quantum Wave of Dark Energy
(Articles)
Mohamed S. El Naschie
Journal of Modern Physics
Vol.4 No.10
,October 31, 2013
DOI:
10.4236/jmp.2013.410170
6,292
Downloads
9,888
Views
Citations
On the Origin of Electric Charge
(Articles)
Johannes Antonie Josephus van Leunen
Open Access Library Journal
Vol.2 No.10
,October 22, 2015
DOI:
10.4236/oalib.1101836
1,152
Downloads
2,267
Views
Citations
Capacity Analysis and Information Optimization of WSDM
(Articles)
Yufan Cao
,
Yuehong Shen
Int'l J. of Communications, Network and System Sciences
Vol.9 No.5
,May 30, 2016
DOI:
10.4236/ijcns.2016.95015
2,208
Downloads
2,815
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,342
Downloads
9,641
Views
Citations
Information Hiding Method Based on Block DWT Sub-Band Feature Encoding
(Articles)
Qiudong SUN
,
Wenxin MA
,
Wenying YAN
,
Hong DAI
Journal of Software Engineering and Applications
Vol.2 No.5
,December 28, 2009
DOI:
10.4236/jsea.2009.25051
5,313
Downloads
8,998
Views
Citations
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
(Articles)
Jiangui Zhang
,
Huibin Qi
Journal of Computer and Communications
Vol.8 No.12
,December 24, 2020
DOI:
10.4236/jcc.2020.812012
452
Downloads
1,670
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top