Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Beyond Spacetime Geometry—The Death of Philosophy and Its Quantum Reincarnation
(Articles)
Wen-Ran Zhang
Journal of Modern Physics
Vol.3 No.9A
,September 28, 2012
DOI:
10.4236/jmp.2012.329164
8,070
Downloads
15,959
Views
Citations
This article belongs to the Special Issue on
Gravitation, Astrophysics and Cosmology
G-CPT Symmetry of Quantum Emergence and Submergence—An Information Conservational Multiagent Cellular Automata Unification of CPT Symmetry and CP Violation for Equilibrium-Based Many-World Causal Analysis of Quantum Coherence and Decoherence
(Articles)
Wen-Ran Zhang
Journal of Quantum Information Science
Vol.6 No.2
,May 9, 2016
DOI:
10.4236/jqis.2016.62008
3,170
Downloads
4,739
Views
Citations
Assessment and Prediction of Software Reliability in Mobile Applications
(Articles)
Osama Barack
,
Liguo Huang
Journal of Software Engineering and Applications
Vol.13 No.9
,September 21, 2020
DOI:
10.4236/jsea.2020.139012
698
Downloads
2,666
Views
Citations
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
(Articles)
Nick Rahimi
,
John Nolen
,
Bidyut Gupta
Journal of Information Security
Vol.10 No.2
,April 1, 2019
DOI:
10.4236/jis.2019.102005
1,705
Downloads
4,441
Views
Citations
Software Composition Using Behavioral Models of Design Patterns
(Articles)
Sargon Hasso
,
Carl Robert Carlson
Journal of Software Engineering and Applications
Vol.7 No.2
,February 25, 2014
DOI:
10.4236/jsea.2014.72012
4,977
Downloads
7,430
Views
Citations
Evaluation of Different Electronic Product Code Discovery Service Models
(Articles)
Su Mon Kywe
,
Jie Shi
,
Yingjiu Li
,
Raghuwanshi Kailash
Advances in Internet of Things
Vol.2 No.2
,April 24, 2012
DOI:
10.4236/ait.2012.22005
6,348
Downloads
14,075
Views
Citations
A State Estimation Method for Sound Environment System with Unknown Observation Mechanism by Introducing Fuzzy Inference
(Articles)
Hisako Orimoto
,
Akira Ikuta
Intelligent Information Management
Vol.4 No.4
,July 27, 2012
DOI:
10.4236/iim.2012.44018
4,471
Downloads
6,700
Views
Citations
Factors of Acceptance for Mobile Learning in Corporate Settings: An Empirical Investigation in Banking Industry
(Articles)
Ayse Kok
Intelligent Information Management
Vol.5 No.5
,September 23, 2013
DOI:
10.4236/iim.2013.55015
3,925
Downloads
6,206
Views
Citations
Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks
(Articles)
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.3
,March 5, 2015
DOI:
10.4236/ijcns.2015.83003
3,333
Downloads
3,905
Views
Citations
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
(Articles)
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.3
,March 20, 2015
DOI:
10.4236/ijcns.2015.83004
3,941
Downloads
5,308
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,700
Downloads
13,877
Views
Citations
The Acceptance and Use of Computer Based Assessment in Higher Education
(Articles)
Mahmoud Maqableh
,
Ra’ed Moh’d Taisir Masa’deh
,
Ashraf Bany Mohammed
Journal of Software Engineering and Applications
Vol.8 No.10
,October 26, 2015
DOI:
10.4236/jsea.2015.810053
6,834
Downloads
9,842
Views
Citations
Fault Tolerance Mechanisms in Distributed Systems
(Articles)
Arif Sari
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812042
35,083
Downloads
39,509
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Comparative Analysis of Wireless Security Protocols: WEP vs WPA
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812043
8,739
Downloads
12,653
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Security and Optimization Challenges of Green Data Centers
(Articles)
Arif Sari
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812044
5,836
Downloads
7,434
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,943
Downloads
4,891
Views
Citations
A Novel Triangular Chaotic Map (TCM) with Full Intensive Chaotic Population Based on Logistic Map
(Articles)
Mahmoud Maqableh
Journal of Software Engineering and Applications
Vol.8 No.12
,December 31, 2015
DOI:
10.4236/jsea.2015.812059
6,560
Downloads
7,907
Views
Citations
Statistical Fault Diagnosis Methods by Using Higher-Order Correlation Information between Sound and Vibration
(Articles)
Hisako Orimoto
Intelligent Information Management
Vol.8 No.4
,July 12, 2016
DOI:
10.4236/iim.2016.84007
1,852
Downloads
2,617
Views
Citations
Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level
(Articles)
Ra’ed Mas’adeh
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83011
1,733
Downloads
3,356
Views
Citations
The Investigation of Jordanian Education Ministry Employees’ Attitude toward the Using of Cloud ERP
(Articles)
Hassan Alhanatleh
,
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.9 No.11
,November 11, 2016
DOI:
10.4236/ijcns.2016.911036
1,498
Downloads
2,548
Views
Citations
This article belongs to the Special Issue on
Security, Privacy and Trust in Network-based Security Algorithms in Big Data and Cloud Computing Challenges
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top