Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Study on 3D Geological Model of Highway Tunnels Modeling Method
(Articles)
Kun ZHENG
,
Fang ZHOU
,
Pei LIU
,
Peng KAN
Journal of Geographic Information System
Vol.2 No.1
,January 27, 2010
DOI:
10.4236/jgis.2010.21002
6,169
Downloads
11,361
Views
Citations
Product Configuration Management in ICT Companies: The Practitioners’ Perspective
(Articles)
Hanna Kropsu-Vehkapera
,
Harri Haapasalo
,
Olli Jaaskelainen
,
Kongkiti Phusavat
Technology and Investment
Vol.2 No.4
,November 4, 2011
DOI:
10.4236/ti.2011.24028
6,217
Downloads
11,115
Views
Citations
Contrasting Vertical Structure of Recent Arctic Warming in Different Data Sets
(Articles)
Igor Esau
,
Vladimir Alexeev
,
Irina Repina
,
Svetlana Sorokina
Atmospheric and Climate Sciences
Vol.3 No.1
,January 30, 2013
DOI:
10.4236/acs.2013.31001
3,742
Downloads
6,271
Views
Citations
Beyond the Modernization Theory: So-cio-Demographic Changes, Economic Structure and Forest Transition in a Multi-Dimensional Time-Series Analysis for Italy
(Articles)
Agostino Ferrara
,
Luca Salvati
,
Claudia Becagli
,
Giada Bertini
Open Journal of Social Sciences
Vol.2 No.11
,November 28, 2014
DOI:
10.4236/jss.2014.211024
3,797
Downloads
4,728
Views
Citations
A Robust Estimation Method for Camera Calibration with Known Rotation
(Articles)
Amir Egozi
,
Dov Eilot
,
Peter Maass
,
Chen Sagiv
Applied Mathematics
Vol.6 No.9
,August 12, 2015
DOI:
10.4236/am.2015.69137
3,068
Downloads
4,035
Views
Citations
Model Design for AMT Data Inversion
(Articles)
Shancong Yao
,
Ruliang Zhang
,
Baoqiang Qiao
,
Hanping Wan
,
Xiang Yu
Open Journal of Geology
Vol.7 No.3
,March 30, 2017
DOI:
10.4236/ojg.2017.73028
1,594
Downloads
2,177
Views
Citations
Design of Library Management System
(Articles)
Chunchao Liu
,
Sheng Ma
Open Access Library Journal
Vol.5 No.12
,December 25, 2018
DOI:
10.4236/oalib.1104974
6,665
Downloads
25,016
Views
Citations
An Information Content and Set of Common Superconcepts-Based Algorithm to Estimate Similarity between Concepts of Ontologies
(Articles)
Gbede Sylvain Gbame
,
Maho Wielfrid Morie
,
Konan Marcelin Brou
Open Journal of Applied Sciences
Vol.13 No.11
,November 10, 2023
DOI:
10.4236/ojapps.2023.1311150
56
Downloads
157
Views
Citations
Predictors of the Aggregate of COVID-19 Cases and Its Case-Fatality: A Global Investigation Involving 120 Countries
(Articles)
Sarah Al-Gahtani
,
Mohamed Shoukri
,
Maha Al-Eid
Open Journal of Statistics
Vol.11 No.2
,March 9, 2021
DOI:
10.4236/ojs.2021.112014
499
Downloads
1,376
Views
Citations
Research on the Recommending Learning Model in the Intelligent Age
(Articles)
Haitang Lin
Open Access Library Journal
Vol.11 No.1
,January 25, 2024
DOI:
10.4236/oalib.1111132
36
Downloads
143
Views
Citations
Research on Cyberspace Mimic Defense Based on Dynamic Heterogeneous Redundancy Mechanism
(Articles)
Junjie Xu
Journal of Computer and Communications
Vol.9 No.7
,July 5, 2021
DOI:
10.4236/jcc.2021.97001
262
Downloads
1,403
Views
Citations
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment
(Articles)
Amir Mohamed Talib
Journal of Information Security
Vol.6 No.2
,April 16, 2015
DOI:
10.4236/jis.2015.62013
5,929
Downloads
7,189
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,360
Downloads
8,489
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,780
Downloads
8,405
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Study on the Real-Time Security Evaluation for the Train Service Status Using Safety Region Estimation
(Articles)
Guiling Liao
,
Yong Qin
,
Xiaoqing Cheng
,
Lisha Pan
,
Lin He
,
Shan Yu
,
Yuan Zhang
Journal of Intelligent Learning Systems and Applications
Vol.5 No.4
,November 12, 2013
DOI:
10.4236/jilsa.2013.54025
4,191
Downloads
5,834
Views
Citations
This article belongs to the Special Issue on
Intelligent Information Processing in Metro Train Safety-Critical System and Application
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,166
Downloads
5,541
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,505
Downloads
2,578
Views
Citations
Use of AI Voice Authentication Technology Instead of Traditional Keypads in Security Devices
(Articles)
Deepak Ramesh Chandran
Journal of Computer and Communications
Vol.10 No.6
,June 13, 2022
DOI:
10.4236/jcc.2022.106002
263
Downloads
2,104
Views
Citations
Stand-Alone Patient Reception and Referral System with Health Data Management
(Articles)
Ababacar Sadikh Faye
,
Ousmane Sow
,
Mame Andallah Diop
,
Jupiter Ndiaye
,
Youssou Traore
,
Oumar Diallo
Engineering
Vol.15 No.10
,October 24, 2023
DOI:
10.4236/eng.2023.1510042
72
Downloads
305
Views
Citations
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
(Articles)
Sina Ahmadi
Journal of Information Security
Vol.15 No.2
,March 27, 2024
DOI:
10.4236/jis.2024.152010
77
Downloads
722
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top