Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
(Articles)
Yuxin Du
,
Xiaoli He
,
Yongming Huang
Journal of Computer and Communications
Vol.11 No.3
,March 29, 2023
DOI:
10.4236/jcc.2023.113004
69
Downloads
379
Views
Citations
Research on User Pairing Techniques Based on NOMA in Cognitive Radio Networks
(Articles)
Yongming Huang
,
Xiaoli He
,
Yuxin Du
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113010
92
Downloads
440
Views
Citations
A Blockchain-Based Framework for Smart Tourism
(Articles)
Chun He
,
Caijian Hua
Journal of Computer and Communications
Vol.11 No.7
,July 28, 2023
DOI:
10.4236/jcc.2023.117008
115
Downloads
543
Views
Citations
The “Iterated Weakest Link” Model of Adaptive Security Investment
(Articles)
Rainer Böhme
,
Tyler Moore
Journal of Information Security
Vol.7 No.2
,March 31, 2016
DOI:
10.4236/jis.2016.72006
3,010
Downloads
4,288
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Marketing and Business Analysis in the Era of Big Data
(Articles)
Yiying Hu
American Journal of Industrial and Business Management
Vol.8 No.7
,July 25, 2018
DOI:
10.4236/ajibm.2018.87117
2,713
Downloads
7,596
Views
Citations
Unstable Rifts, a Leaky Transform Zone and a Microplate: Analogues from South Iceland
(Articles)
Maryam Khodayar
,
Sveinbjörn Björnsson
,
Skúli Víkingsson
,
Guðrún Sigríður Jónsdóttir
Open Journal of Geology
Vol.10 No.4
,April 17, 2020
DOI:
10.4236/ojg.2020.104017
570
Downloads
1,813
Views
Citations
Numerical Study of Burning of Biomass in Fixed Bed
(Articles)
Chamga Tchana Armand
,
Obounou Akong
,
Beguide Bonoma
Energy and Power Engineering
Vol.11 No.2
,February 21, 2019
DOI:
10.4236/epe.2019.112003
956
Downloads
2,061
Views
Citations
+-Evidence of Porphyry Deposits in the Ntem Complex: A Case Study from Structural and Hydrothermal Alteration Zones Mapping through Landsat-8 OLI, Aeromagnetic and Geological Data Integration in the Yaounde-Sangmelima Region (Southern Cameroon)
(Articles)
Stephane Patrick Assembe
,
Theophile Ndougsa Mbarga
,
Françoise Enyegue A. Nyam
,
Paul Claude Ngoumou
,
Arsene Meying
,
Daniel Herve Gouet
,
Alain Zanga
,
Jean Daniel Ngoh
Advances in Remote Sensing
Vol.9 No.2
,June 8, 2020
DOI:
10.4236/ars.2020.92004
551
Downloads
1,768
Views
Citations
A Novel Efficient Mode Selection Approach for H.264
(Articles)
Lu Lu
,
Wei Zhou
Journal of Software Engineering and Applications
Vol.3 No.5
,May 24, 2010
DOI:
10.4236/jsea.2010.35053
7,157
Downloads
10,670
Views
Citations
Priority-Based CCA Periods for Efficient and Reliable Communications in Wireless Sensor Networks
(Articles)
Mounib Khanafer
,
Mouhcine Guennoun
,
Hussein T. Mouftah
Wireless Sensor Network
Vol.4 No.2
,February 23, 2012
DOI:
10.4236/wsn.2012.42007
4,152
Downloads
7,784
Views
Citations
Boundary Induced Inductive Delay in Transmission of Electromagnetic Signals
(Articles)
Yong Yang
,
Mingzhi Li
,
Yan Sun
,
Dongfei Pei
,
Shengyong Xu
Journal of Electromagnetic Analysis and Applications
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/jemaa.2012.44020
4,616
Downloads
6,931
Views
Citations
Quality-Oriented Software Product Line Architecture Design
(Articles)
Lei Tan
,
Yuqing Lin
,
Huilin Ye
Journal of Software Engineering and Applications
Vol.5 No.7
,June 15, 2012
DOI:
10.4236/jsea.2012.57054
5,998
Downloads
10,684
Views
Citations
An Application of Eulerian Graph to PI on
Mn
(
C
)
(Articles)
Songfa You
,
Hongyan Zhao
,
Yijun Feng
,
Ming Cao
Applied Mathematics
Vol.3 No.7
,June 19, 2012
DOI:
10.4236/am.2012.37121
4,419
Downloads
7,078
Views
Citations
Context-Aware Rate-Adaptive Beaconing for Efficient and Scalable Vehicular Safety Communication
(Articles)
Alvin Sebastian
,
Maolin Tang
,
Yanming Feng
,
Mark Looi
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9
,September 18, 2012
DOI:
10.4236/ijcns.2012.59064
3,919
Downloads
6,113
Views
Citations
Student-Centered Learning Objects to Support the Self-Regulated Learning of Computer Science
(Articles)
Ali Alharbi
,
Frans Henskens
,
Michael Hannaford
Creative Education
Vol.3 No.6A
,October 24, 2012
DOI:
10.4236/ce.2012.326116
5,484
Downloads
9,879
Views
Citations
This article belongs to the Special Issue on
Higher Education
An Application of Linear Automata to Near Rings
(Articles)
Songfa You
,
Yijun Feng
,
Ming Cao
,
Yaping Wei
Applied Mathematics
Vol.3 No.11
,November 14, 2012
DOI:
10.4236/am.2012.311223
3,065
Downloads
5,052
Views
Citations
A Quick Method for Judging the Feasibility of Security-Constrained Unit Commitment Problems within Lagrangian Relaxation Framework
(Articles)
Sangang Guo
Energy and Power Engineering
Vol.4 No.6
,November 29, 2012
DOI:
10.4236/epe.2012.46057
5,279
Downloads
7,568
Views
Citations
On the Set of 2 - Common Consequent of Primitive Digraphs with Exact
d
Vertices Having Loop
(Articles)
Xiaogen Chen
Applied Mathematics
Vol.3 No.12
,December 21, 2012
DOI:
10.4236/am.2012.312268
2,723
Downloads
4,398
Views
Citations
Using Wikipedia as an External Knowledge Source for Supporting Contextual Disambiguation
(Articles)
Shahida Jabeen
,
Xiaoying Gao
,
Peter Andreae
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 25, 2013
DOI:
10.4236/jsea.2012.512B034
3,787
Downloads
5,607
Views
Citations
Automatic Event Trigger Word Extraction in Chinese Event
(Articles)
Long Tian
,
Wen Ma
,
Wen Zhou
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 25, 2013
DOI:
10.4236/jsea.2012.512B040
4,885
Downloads
6,886
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top