Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Feasibility and Challenges of 5G Network Deployment in Least Developed Countries (LDC)
(Articles)
Ashikur Rahman
,
Salsabil Arabi
,
Raqeebir Rab
Wireless Sensor Network
Vol.13 No.1
,January 29, 2021
DOI:
10.4236/wsn.2021.131001
1,051
Downloads
6,885
Views
Citations
Inmap-t
: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
(Articles)
Antonino Vitale
,
Marc Dacier
Journal of Computer and Communications
Vol.9 No.6
,June 29, 2021
DOI:
10.4236/jcc.2021.96010
212
Downloads
758
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,822
Downloads
4,460
Views
Citations
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
(Articles)
Koushicaa Sundar
,
Sanjeev Kumar
Journal of Information Security
Vol.7 No.4
,July 7, 2016
DOI:
10.4236/jis.2016.74018
2,842
Downloads
5,357
Views
Citations
Two-Tier GCT Based Approach for Attack Detection
(Articles)
Zhiwen Wang
,
Qin Xia
,
Ke Lu
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11009
4,623
Downloads
8,141
Views
Citations
Identification of Contaminant Source Characteristics and Monitoring Network Design in Groundwater Aquifers: An Overview
(Review)
Mahsa Amirabdollahian
,
Bithin Datta
Journal of Environmental Protection
Vol.4 No.5A
,May 27, 2013
DOI:
10.4236/jep.2013.45A004
6,685
Downloads
11,197
Views
Citations
This article belongs to the Special Issue on
Pollutants Source Control and Processing
A Novel SAR Image Ship Small Targets Detection Method
(Articles)
Yu Song
,
Min Li
,
Xiaohua Qiu
,
Weidong Du
,
Yujie He
,
Xiaoxiang Qi
Journal of Computer and Communications
Vol.9 No.2
,February 25, 2021
DOI:
10.4236/jcc.2021.92004
490
Downloads
1,180
Views
Citations
An Oracle Bone Inscription Detector Based on Multi-Scale Gaussian Kernels
(Articles)
Guoying Liu
,
Shuanghao Chen
,
Jing Xiong
,
Qingju Jiao
Applied Mathematics
Vol.12 No.3
,March 30, 2021
DOI:
10.4236/am.2021.123014
372
Downloads
1,031
Views
Citations
Overview of Object Detection Algorithms Using Convolutional Neural Networks
(Articles)
Junsong Ren
,
Yi Wang
Journal of Computer and Communications
Vol.10 No.1
,January 29, 2022
DOI:
10.4236/jcc.2022.101006
1,298
Downloads
12,381
Views
Citations
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
(Articles)
Linli Wang
,
Hu Wang
,
Hanlu Lei
Journal of Computer and Communications
Vol.11 No.5
,May 31, 2023
DOI:
10.4236/jcc.2023.115014
106
Downloads
445
Views
Citations
Wildfire Monitoring and Detection System Using Wireless Sensor Network: A Case Study of Tanzania
(Articles)
Albert S. Lutakamale
,
Shubi Kaijage
Wireless Sensor Network
Vol.9 No.8
,August 18, 2017
DOI:
10.4236/wsn.2017.98015
2,355
Downloads
6,865
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,159
Downloads
5,520
Views
Citations
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
(Articles)
Alese Boniface Kayode
,
Alowolodu Olufunso Dayo
,
Adekunle Adewale Uthman
Communications and Network
Vol.13 No.2
,May 27, 2021
DOI:
10.4236/cn.2021.132006
300
Downloads
1,001
Views
Citations
Multi-Energy Gamma-Ray Attenuations for Non-Destructive Detection of Hazardous Materials
(Articles)
Kaylyn Olshanoski
,
Chary Rangacharyulu
Journal of Modern Physics
Vol.13 No.1
,January 26, 2022
DOI:
10.4236/jmp.2022.131005
183
Downloads
816
Views
Citations
Influence of Proxies on the Reported Frequency of Falls, Fear of Falling and Activity Restriction in Older People
(Articles)
Elise Mendes da Costa
,
Isabelle Godin
,
Thierry Pepersack
,
Michèle Dramaix
,
Yves Coppieters
,
Martine Bantuelle
,
Alain Levêque
Health
Vol.6 No.12
,June 27, 2014
DOI:
10.4236/health.2014.612186
2,771
Downloads
3,719
Views
Citations
Phytocenoses at Environments Contact Sites as Proxies of Climate Dynamics with Time (East Siberia, Russia)
(Articles)
Alexander P. Sizykh
Natural Science
Vol.8 No.3
,March 11, 2016
DOI:
10.4236/ns.2016.83014
1,942
Downloads
2,502
Views
Citations
Current Networks of Long Proxies for Building Reconstruction Models of the Atlantic Multidecadal Oscillation
(Articles)
Markus Lindholm
,
Risto Jalkanen
,
Maxim G. Ogurtsov
Atmospheric and Climate Sciences
Vol.6 No.3
,May 23, 2016
DOI:
10.4236/acs.2016.63030
2,446
Downloads
3,096
Views
Citations
This article belongs to the Special Issue on
Climatology Research
Model of Combined Transport of Perishable Foodstuffs and Safety Inspection Based on Data Mining
(Articles)
Tongjuan Liu
,
Anqi Hu
Food and Nutrition Sciences
Vol.8 No.7
,July 27, 2017
DOI:
10.4236/fns.2017.87054
962
Downloads
1,717
Views
Citations
The Online Assessment of Electric Distribution Network Load Capability
(Articles)
Haoming Liu
,
Zhenkun Li
,
Kun Yu
,
Xingying Chen
Journal of Electromagnetic Analysis and Applications
Vol.1 No.1
,March 12, 2009
DOI:
10.4236/jemaa.2009.11008
5,388
Downloads
9,800
Views
Citations
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
(Articles)
Danwei Chen
,
Xizhou Yu
,
Xianghui Dong
Wireless Sensor Network
Vol.2 No.5
,May 27, 2010
DOI:
10.4236/wsn.2010.24049
5,514
Downloads
9,747
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top